CVE-2018-15599

The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:51

Type Values Removed Values Added
References () http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html - Mailing List, Third Party Advisory () http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html - Mailing List, Third Party Advisory
References () http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002109.html - Mailing List, Third Party Advisory () http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002109.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/08/msg00026.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/08/msg00026.html - Mailing List, Third Party Advisory
References () https://matt.ucc.asn.au/dropbear/CHANGES - () https://matt.ucc.asn.au/dropbear/CHANGES -
References () https://old.reddit.com/r/blackhat/comments/97ywnm/openssh_username_enumeration/e4e05n2/ - Third Party Advisory () https://old.reddit.com/r/blackhat/comments/97ywnm/openssh_username_enumeration/e4e05n2/ - Third Party Advisory

Information

Published : 2018-08-21 01:29

Updated : 2024-11-21 03:51


NVD link : CVE-2018-15599

Mitre link : CVE-2018-15599

CVE.ORG link : CVE-2018-15599


JSON object : View

Products Affected

dropbear_ssh_project

  • dropbear_ssh

debian

  • debian_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor