The (1) elog.c and (2) elogd.c components in elog before 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Elog_web_logbook | Stefan_ritt | 2.1.0 | 2.1.0 |
Elog_web_logbook | Stefan_ritt | 2.0.2 | 2.0.2 |
Elog_web_logbook | Stefan_ritt | 2.2.1 | 2.2.1 |
Elog_web_logbook | Stefan_ritt | 2.5 | 2.5 |
Elog_web_logbook | Stefan_ritt | 2.2.0 | 2.2.0 |
Elog_web_logbook | Stefan_ritt | 2.2.4 | 2.2.4 |
Elog_web_logbook | Stefan_ritt | 2.5.6 | 2.5.6 |
Elog_web_logbook | Stefan_ritt | 2.2.3 | 2.2.3 |
Elog_web_logbook | Stefan_ritt | 2.4 | 2.4 |
Elog_web_logbook | Stefan_ritt | 2.1.2 | 2.1.2 |
Elog_web_logbook | Stefan_ritt | 2.0.1 | 2.0.1 |
Elog_web_logbook | Stefan_ritt | 2.0.4 | 2.0.4 |
Elog_web_logbook | Stefan_ritt | 2.0.3 | 2.0.3 |
Elog_web_logbook | Stefan_ritt | 2.1.3 | 2.1.3 |
Elog_web_logbook | Stefan_ritt | 2.0.0 | 2.0.0 |
Elog_web_logbook | Stefan_ritt | 2.1.1 | 2.1.1 |
Elog_web_logbook | Stefan_ritt | 2.2.2 | 2.2.2 |
Elog_web_logbook | Stefan_ritt | 2.0.5 | 2.0.5 |