Timing Attack Vulnerability in OpenSSH-portable

Timing Attack Vulnerability in OpenSSH-portable

CVE-2003-0190 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.

Learn more about our User Device Pen Test.