CVE-2018-15473

Published Aug 17, 2018

Last updated 24 days ago

Overview

Description
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Source
cve@mitre.org
NVD status
Modified
Products
openssh, debian_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_workstation, ubuntu_linux, cn1610_firmware, aff_baseboard_management_controller, cloud_backup, data_ontap_edge, fas_baseboard_management_controller, oncommand_unified_manager, ontap_select_deploy, service_processor, steelstore_cloud_integrated_storage, virtual_storage_console, clustered_data_ontap, data_ontap, vasa_provider, storage_replication_adapter, sun_zfs_storage_appliance_kit, scalance_x204rna_firmware

Risk scores

CVSS 3.1

Type
Primary
Base score
5.3
Impact score
1.4
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
5
Impact score
2.9
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-362
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-362

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.