SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ssh2 | Ssh | 2.0 (including) | 2.0 (including) |
Ssh2 | Ssh | 2.0.1 (including) | 2.0.1 (including) |
Ssh2 | Ssh | 2.0.2 (including) | 2.0.2 (including) |
Ssh2 | Ssh | 2.0.3 (including) | 2.0.3 (including) |
Ssh2 | Ssh | 2.0.4 (including) | 2.0.4 (including) |
Ssh2 | Ssh | 2.0.5 (including) | 2.0.5 (including) |
Ssh2 | Ssh | 2.0.6 (including) | 2.0.6 (including) |
Ssh2 | Ssh | 2.0.7 (including) | 2.0.7 (including) |
Ssh2 | Ssh | 2.0.8 (including) | 2.0.8 (including) |
Ssh2 | Ssh | 2.0.9 (including) | 2.0.9 (including) |
Ssh2 | Ssh | 2.0.10 (including) | 2.0.10 (including) |
Ssh2 | Ssh | 2.0.11 (including) | 2.0.11 (including) |