Timing Attack Vulnerability in OpenSSH-portable
CVE-2003-0190 · MEDIUM Severity
AV:N/AC:L/AU:N/C:P/I:N/A:N
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
Learn more about our User Device Pen Test.