2021-09-30 19:42:07 +00:00
|
|
|
id: CVE-2016-6210
|
2021-04-11 13:02:20 +00:00
|
|
|
|
|
|
|
info:
|
2021-11-01 18:34:47 +00:00
|
|
|
name: OpenSSH username enumeration < v7.3
|
|
|
|
author: iamthefrogy,forgedhallpass
|
2021-09-30 19:42:07 +00:00
|
|
|
severity: medium
|
2021-11-01 18:34:47 +00:00
|
|
|
description: OpenSSH before 7.3 is vulnerable to username enumeration and DoS vulnerabilities.
|
2021-08-18 11:37:49 +00:00
|
|
|
reference:
|
2021-08-19 14:44:46 +00:00
|
|
|
- http://seclists.org/fulldisclosure/2016/Jul/51
|
|
|
|
- https://security-tracker.debian.org/tracker/CVE-2016-6210
|
|
|
|
- http://openwall.com/lists/oss-security/2016/08/01/2
|
2021-11-01 18:34:47 +00:00
|
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2016-6210
|
2021-09-30 19:42:07 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
|
|
cvss-score: 5.9
|
|
|
|
cve-id: CVE-2016-6210
|
|
|
|
cwe-id: CWE-200
|
2022-04-22 10:38:41 +00:00
|
|
|
tags: cve,cve2016,network,openssh
|
2021-04-11 13:02:20 +00:00
|
|
|
|
|
|
|
network:
|
|
|
|
- host:
|
2021-04-11 13:16:48 +00:00
|
|
|
- "{{Hostname}}"
|
2022-01-07 07:28:37 +00:00
|
|
|
- "{{Host}}:22"
|
2021-12-18 09:28:35 +00:00
|
|
|
|
2021-04-11 13:02:20 +00:00
|
|
|
matchers:
|
2021-11-01 18:34:47 +00:00
|
|
|
- type: regex
|
|
|
|
regex:
|
2021-12-18 09:28:35 +00:00
|
|
|
- '(?i)SSH-2.0-OpenSSH_(?:[1-6][^\d][^\r\n]+|7\.[0-2][^\d][\n^\r]+)'
|
2021-11-01 18:34:47 +00:00
|
|
|
|
|
|
|
extractors:
|
|
|
|
- type: regex
|
|
|
|
regex:
|
2021-12-18 09:28:35 +00:00
|
|
|
- '(?i)SSH-2.0-OpenSSH_[^\r\n]+'
|