vendor:
N/A
by:
Matthew Daley, Justin Gardner, Lee David Painter
5.3
CVSS
MEDIUM
User Enumeration
200
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2018-15473
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2018-15599/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-15599/, https://www.rapid7.com/db/vulnerabilities/openbsd-openssh-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2018-15473/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-15473/
Other Scripts:
N/A
Platforms Tested: Linux, Mac, Windows
2018
SSH User Enumeration by Leap Security
This exploit is a python script that uses malicious functions to malform a packet and overwrite the MSG_SERVICE_ACCEPT handler. It then performs authentication with the malicious packet and username to check if the username is valid.
Mitigation:
Ensure that the SSH server is configured to only allow authentication with valid usernames.