[Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability
Vital Koshalew
vkoshalew at voxdata.com
Mon Apr 8 12:43:17 UTC 2019
@Seth Arnold,
Qualys automated vulnerability scanner is not supposed to do any
penetration testing, including vulnerability exploitation attempts as it
is ran unattended so must not create any risks of DoS. Trying to exploit
some vulnerabilities can jeopardize production systems. This way, such
non-intrusive scans are by definition limited to sending completely
legitimate requests, checking the responses and then analyzing them
based on a vulnerability database.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1794629
Title:
CVE-2018-15473 - User enumeration vulnerability
Status in openssh package in Ubuntu:
Fix Released
Status in openssh source package in Trusty:
Fix Released
Status in openssh source package in Xenial:
Fix Released
Status in openssh source package in Bionic:
Fix Released
Status in openssh source package in Cosmic:
Fix Released
Bug description:
https://nvd.nist.gov/vuln/detail/CVE-2018-15473
OpenSSH through 7.7 is prone to a user enumeration vulnerability due
to not delaying bailout for an invalid authenticating user until after
the packet containing the request has been fully parsed, related to
auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Fixed in Debian: https://www.debian.org/security/2018/dsa-4280
Currently pending triage? https://people.canonical.com/~ubuntu-
security/cve/2018/CVE-2018-15473.html
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1794629/+subscriptions
More information about the foundations-bugs
mailing list