CVE-2018-15919

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
References
Link Resource
http://seclists.org/oss-sec/2018/q3/180 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/105163 Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20181221-0001/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-08-28 08:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-15919

Mitre link : CVE-2018-15919

CVE.ORG link : CVE-2018-15919


JSON object : View

Products Affected

netapp

  • steelstore
  • cn1610
  • data_ontap_edge
  • cn1610_firmware
  • cloud_backup
  • ontap_select_deploy

openbsd

  • openssh
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor