|Title:||OpenSSH User Enumeration Vulnerability-Aug18 (Windows)|
|Summary:||This host is installed with openssh and; is prone to user enumeration vulnerability.|
This host is installed with openssh and
is prone to user enumeration vulnerability.
The flaw is due to not delaying bailout for
an invalid authenticating user until after the packet containing the request
has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and
Successfully exploitation will allow remote
attacker to test whether a certain user exists or not (username enumeration)
on a target OpenSSH server.
OpenSSH version 7.7 and prior on Windows.
Update to version 7.8 or later.
Common Vulnerability Exposure (CVE) ID: CVE-2018-15473|
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.