CVE-2009-1273

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
VendorProductVersion
andrew_j.kortypam_ssh
1.92
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libpam-ssh
bullseye
2.3+ds-2
fixed
etch
no-dsa
sid
2.3+ds-8
fixed
trixie
2.3+ds-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libpam-ssh
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
ignored
jaunty
ignored
intrepid
ignored
hardy
ignored
gutsy
ignored
dapper
ignored
Common Weakness Enumeration