vendor:
OpenSSH
by:
fulldisclosure
5,9
CVSS
MEDIUM
User Enumeration
200
CWE
Product Name: OpenSSH
Affected Version From: opensshd-7.2p2
Affected Version To: opensshd-7.2p2
Patch Exists: Unknown
Related CWE: CVE-2016-6210
CPE: opensshd
Metasploit:
https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/openbsd-openssh-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-6.1-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-5.3-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-7.1-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-7.2-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/panos-cve-2016-6210/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2016
User Enumeration using Open SSHD
By sending large passwords, a remote user can enumerate users on system that runs SSHD. This problem exists in most modern configuration due to the fact that it takes much longer to calculate SHA256/SHA512 hash than BLOWFISH hash.
Mitigation:
This issue was reported to OPENSSH developer group and they have sent a patch ( don't know if patch was released yet).