Displaying 2 results from an estimated 2 matches for "curesec".
2016 Jul 19
2
Openssh use enumeration
...s to the correct channel.
I have notice that OpenSSH has recognized the presence of the user
enumeration as a vulnerability,
http://seclists.org/fulldisclosure/2016/Jul/51 (CVE-2016-6210).
I want to make an appreciation, this is a old vulnerability
already announced three years ago.
https://blog.curesec.com/article/blog/OpenSSH-User-Enumeration-Time-Based-Attack-20.html
http://seclists.org/fulldisclosure/2013/Jul/88
http://www.behindthefirewalls.com/2014/07/openssh-user-enumeration-time-based.html
I would like to point out that there is another vulnerability present in
the bug, it's possib...
2016 Jul 22
18
Call for testing: OpenSSH 7.3
...stem's crypt(3) function via sshd(8). An attacker could
send very long passwords that would cause excessive CPU use in
crypt(3). sshd(8) now refuses to accept password authentication
requests of length greater than 1024 characters. Independently
reported by Tomas Kuthan (Oracle) and curesec via coredump at
autistici.org.
* sshd(8): Mitigate timing differences in password authentication
that could be used to discern valid from invalid account names
when long passwords were sent and particular password hashing
algorithms are in use on the server. CVE-2016-6210, reported by...