CVE-2009-1273

EUVD-2009-1272
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
Affected Products (NVD)
VendorProductVersion
andrew_j.kortypam_ssh
1.92
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libpam-ssh
bullseye
2.3+ds-2
fixed
etch
no-dsa
sid
2.3+ds-8
fixed
trixie
2.3+ds-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libpam-ssh
dapper
ignored
gutsy
ignored
hardy
ignored
intrepid
ignored
jaunty
ignored
karmic
ignored
lucid
not-affected
maverick
not-affected
natty
not-affected
oneiric
not-affected
Common Weakness Enumeration