Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/55173 | third party advisory vendor advisory |
https://matt.ucc.asn.au/dropbear/CHANGES | vendor advisory |
http://www.securityfocus.com/bid/62993 | vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2013/10/16/11 | third party advisory mailing list |
http://lists.opensuse.org/opensuse-updates/2013-11/msg00046.html | third party advisory vendor advisory |
https://support.citrix.com/article/CTX216642 | third party advisory |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html | third party advisory vendor advisory |
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a | third party advisory patch |