Vulnerability Description
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openssh | 1.2 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747
- http://www.securityfocus.com/archive/1/320153
- http://www.securityfocus.com/archive/1/320302
- http://www.securityfocus.com/archive/1/320440
- http://www.securityfocus.com/bid/7482
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747
- http://www.securityfocus.com/archive/1/320153
- http://www.securityfocus.com/archive/1/320302
- http://www.securityfocus.com/archive/1/320440
- http://www.securityfocus.com/bid/7482
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
FAQ
What is CVE-2003-1562?
CVE-2003-1562 is a vulnerability with a CVSS score of 7.6 (HIGH). sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, w...
How severe is CVE-2003-1562?
CVE-2003-1562 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1562?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh.