Vulnerability Details : CVE-2017-2659
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
Vulnerability category: BypassGain privilege
Products affected by CVE-2017-2659
- cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-2659
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-2659
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
Red Hat, Inc. |
CWE ids for CVE-2017-2659
-
The product generates an error message that includes sensitive information about its environment, users, or associated data.Assigned by: secalert@redhat.com (Secondary)
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-2659
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659
1433824 – (CVE-2017-2659) CVE-2017-2659 dropbear: Information leak when given invalid usernameIssue Tracking;Patch;Third Party Advisory
-
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86
dropbear: d7784616409aPatch;Third Party Advisory
Jump to