|Title:||OpenSSH User Enumeration Vulnerability-Aug18 (Windows)|
|Summary:||This host is installed with openssh and; is prone to user enumeration vulnerability.|
This host is installed with openssh and
is prone to user enumeration vulnerability.
The flaw is due to not delaying bailout for
an invalid authenticating user until after the packet containing the request
has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and
Successfully exploitation will allow remote
attacker to test whether a certain user exists or not (username enumeration)
on a target OpenSSH server.
Impact Level: Application
OpenSSH version 7.7 and prior on Windows.
No known solution is available as of 21st
August, 2018. Information regarding this issue will be updated once solution
details are available. For updates refer to Reference links.
Common Vulnerability Exposure (CVE) ID: CVE-2018-15473|
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 69903 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.