|Title:||OpenSSH 'auth2-gss.c' User Enumeration Vulnerability (Windows)|
|Summary:||This host is installed with openssh and; is prone to user enumeration vulnerability.|
This host is installed with openssh and
is prone to user enumeration vulnerability.
The flaw exists in the 'auth-gss2.c' source
code file of the affected software and is due to insufficient validation of
an authentication request packet when the Guide Star Server II (GSS2) component
is used on an affected system.
Successfully exploitation will allow remote
attacker to harvest valid user accounts, which may aid in brute-force attacks.
Impact Level: Application
OpenSSH version 5.9 to 7.8 on Windows.
No known solution is available as of 05th
September, 2018. Information regarding this issue will be updated once solution
details are available.
Common Vulnerability Exposure (CVE) ID: CVE-2018-15919|
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 69903 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.