Vulnerability Details : CVE-2013-4434
Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.
Products affected by CVE-2013-4434
- cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-4434
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4434
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-4434
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4434
-
http://lists.opensuse.org/opensuse-updates/2013-11/msg00046.html
openSUSE-SU-2013:1696-1: moderate: update for dropbearThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html
openSUSE-SU-2013:1616-1: moderate: update for dropbearThird Party Advisory
-
https://matt.ucc.asn.au/dropbear/CHANGES
Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2013/10/16/11
oss-security - Re: CVE Request: dropbear sshd daemon 2013.59 releaseMailing List;Third Party Advisory
-
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a
dropbear: d7784616409aPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/62993
Dropbear SSH 'svr-auth.c' User Enumeration WeaknessThird Party Advisory;VDB Entry
-
https://support.citrix.com/article/CTX216642
Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmwareThird Party Advisory
Jump to