Bug 98594 - CAN-2003-0190 OpenSSH valid username information leak
Summary: CAN-2003-0190 OpenSSH valid username information leak
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: openssh
Version: 2.1
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact: Brian Brock
URL:
Whiteboard:
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2003-07-04 11:16 UTC by Mark J. Cox
Modified: 2007-11-30 22:06 UTC (History)
0 users

(edit)
Clone Of:
(edit)
Last Closed: 2003-07-29 07:27:38 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2003:224 normal SHIPPED_LIVE Low: openssh security update 2003-07-29 04:00:00 UTC

Description Mark J. Cox 2003-07-04 11:16:21 UTC
When configured to allow password-based or challenge-response
authentication, sshd (the OpenSSH server) will use PAM to verify the user's
password.  Under certain conditions, sshd would reject an invalid
authentication attempt without attempting authentication using PAM.

If PAM is configured with its default failure delay, the amount of time
sshd would take to reject an invalid authentication request would vary
widely enough that the timing variations could be used to deduce whether or
not an account with a specified name existed on the server.  This
information could be used to narrow the focus of an attack against some
other component of the system.

Unmodified versions of OpenSSH versions prior to 3.6.1p1 are vulnerable to
this issue.

Updates RHSA-2003:224 will contain backported fixes which cause sshd to always
attempt PAM authentication when performing password and challenge-response
authentication for clients.

Comment 1 Mark J. Cox 2003-07-29 07:27:38 UTC
An errata has been issued which should help the problem described in this bug report. 
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen 
this bug report if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2003-224.html



Note You need to log in before you can comment on or make changes to this bug.