pam_ssh Login Prompt Remote Username Enumeration

critical Nessus Plugin ID 38197

Synopsis

The remote host is running a SSH server with an information disclosure vulnerability.

Description

The remote host is running a SSH server that responds differently to login attempts depending on whether or not a valid username is given. This is likely due to a vulnerable version of pam_ssh.
Other products may be affected as well.

A remote attacker could use this to enumerate valid usernames, which could be used to mount further attacks.

Solution

Contact the vendor for a fix.

See Also

https://bugs.gentoo.org/show_bug.cgi?id=263579

Plugin Details

Severity: Critical

ID: 38197

File Name: pam_ssh_user_enumeration.nasl

Version: 1.21

Type: remote

Family: Misc.

Published: 4/28/2009

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Critical

Base Score: 9.4

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2009-1273

BID: 34333

CWE: 255

Secunia: 34536