cvelist/2017/2xxx/CVE-2017-2659.json
2019-03-20 21:00:49 +00:00

77 lines
2.4 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-2659",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "dropbear",
"version": {
"version_data": [
{
"version_value": "fixed in 2013.59"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-209"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659",
"refsource": "CONFIRM"
},
{
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86",
"refsource": "MISC",
"name": "https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
]
}
}