2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-2243" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-04-25T16:19:00.000" ,
2025-04-09 02:05:49 +00:00
"lastModified" : "2025-04-09T00:30:58.490" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483."
} ,
{
"lang" : "es" ,
"value" : "OpenSSH 4.6 y anteriores, cuando ChallengeResponseAuthentication est\u00e1 habilitado, permite a atacantes remotos determinar la existencia de cuentas de usuario intentando autenticarse mediante S/KEY, lo cual muestra una respuesta diferente si la cuenta de usuario existe, un problema similar a CVE-2001-1483."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "316C8534-9CE3-456C-A04E-5D2B789FBE31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BEB67BB-A442-46C2-8BC1-BBEB009AC532"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6E307F1-C765-409C-835C-133026A5179C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA997F5E-29FE-454A-9006-001D732CD4B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "114134F3-BDFD-465D-8317-82F9D6EFA5A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EED5E506-9D2B-4CAF-8455-B9BE7696E49C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE7CB94E-0479-4939-86F6-0B4BEDE2E739"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78135400-BA1A-42AA-BE17-5588442BCF11"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78F2EDC0-3189-4523-882B-9188C852F793"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2991C07-5486-4590-A74E-46A379DD3339"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EB9BE06-0A36-4853-ADF4-9C1A1854278A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8FC57F38-6545-497B-B6DA-FCAF51755988"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80C55B73-497D-4A22-9230-A4160BF97344"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B235167-9554-4431-88C5-9472DD36FCDE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "580008AC-2667-4708-8F7E-D70416A460EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E05D8E86-EC01-4589-B372-4DEB7845C81F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "764AD252-CA2F-4A87-BCAA-7747E8C410E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "269BB9F7-55E5-4CB3-8429-C37C7132799F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6E6F639-31A0-4026-B6D4-51BA79FB1D20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0211BCE3-0DED-40BA-8A21-1A97B91F71C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AD7BB30-AC79-4153-852C-1053DCF4DE53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F48519C6-0C28-49A5-94C7-EF3AA88E2667"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E188C66-C8F1-4C13-AAFF-7C83B2A884B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9039BE91-AF0A-41E7-8F9F-15375890E120"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08BCB2EA-DF9D-4853-805B-29FA6274E2B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F93417F-2498-4576-9F5D-B59F77D39669"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF3AB42C-B614-4746-99AD-E94140D91BF3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "458167E5-9BC2-40BE-AC8A-9761A4F19494"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "86ACA0ED-A3D0-48A7-B06F-13709AD23B55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0FEB9262-D05E-4610-9C79-3EDE44AC7C0B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8176879B-1875-4AC9-B15A-2ABCFCD04F88"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FAA26A12-F96A-4025-BBCA-72B7A3B1E60C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A02751E9-2D38-4495-9572-8D84D71D4773"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A36BEA2-DAE4-423C-8D85-0F6036351F98"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80DC64F6-FE28-44BA-91D1-EC2DB11B2CFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF23EBA1-D3A9-413F-9E83-43A91492C031"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44CCF5CD-B434-4392-A79A-C1945D2AE30A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEB456B8-9D8B-4985-858D-6A43FA5EE2E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BD4E0F6-4EEA-4EC7-83E7-FC6F7D2E7A3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C35F4ABE-1B0C-4195-8F99-BF993A17882B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ADC7352D-2916-47F7-A256-F897D763DC9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEC3FC36-B246-4DCB-8984-228525D9A356"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC861000-37D8-4B0F-BFA0-57E9BE125B56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E003AB3C-8DF3-4AE8-82A3-984F30E5599B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5EBE75FE-DDE2-43BA-80EF-15A6698EABC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FF67D77-02AC-4807-984D-C5AE9799F051"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "683B26F0-5EA2-455A-8948-27C100BBA3AC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5A75B23-2DD7-4EB2-BEAA-049FF4E51A14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7279E1EC-DEBC-4ACC-925D-06A7697C162F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7910598E-BEC1-4644-9DE4-D8BE505A4F9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB416D0C-6C86-450F-8917-D4B1BD82AB1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3640CCC9-EC4A-44A4-B747-7BAAAD3460C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B2DD362E-9EA9-4E88-9A94-D7B471EB1FD4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3094069-AC2E-43BD-8094-D48E2526DECC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B72CFB3-39C7-469C-AA59-69F5B8993BF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A7154C4-8325-4495-92B1-B7897CD7303E"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securityreason.com/securityalert/2631" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/34600" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/23601" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33794" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20191107-0003/" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securityreason.com/securityalert/2631" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.osvdb.org/34600" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/23601" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33794" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20191107-0003/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Not vulnerable. OpenSSH supplied with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not contain S/KEY support." ,
"lastModified" : "2007-05-23T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}