CVE-2006-5229

OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.

Score2.6
Access VectorNETWORK
Access ComplexityHIGH
AuthenticationNONE
Confidentiality ImpactPARTIAL
Integrity ImpactNONE
Availability ImpactNONE
Published2006-10-10 07:07:00.000-04
Last Modified2018-10-17 05:41:47.000-04

Vulnerable Software List

VendorProductVersions
Openbsd Openssh 4.1

References

SourceLink
BUGTRAQ20061009 yet another OpenSSH timing leak?
BUGTRAQ20061009 Re: yet another OpenSSH timing leak?
BUGTRAQ20061010 Re: yet another OpenSSH timing leak?
BUGTRAQ20061014 Re: yet another OpenSSH timing leak?
BID20418
MISChttp://www.sybsecurity.com/hack-proventia-1.pdf
VUPENADV-2007-2545