Full Disclosure mailing list archives
Re: OpenSSH User Enumeration Time-Based Attack
From: security curmudgeon <jericho () attrition org>
Date: Thu, 11 Jul 2013 14:24:19 -0500 (CDT)
What you describe is CVE-2006-5229. While the CVE description does not explicitly say "long passwords", it does cover the general idea. Read the mail list posts associated with it and it shows people testing based on minor differences in password length. Stands to reason that 39,000 characters would apply.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-5229 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- OpenSSH User Enumeration Time-Based Attack Curesec Research Team (Jul 10)
- Re: OpenSSH User Enumeration Time-Based Attack Jason Hellenthal (Jul 10)
- Re: OpenSSH User Enumeration Time-Based Attack Swair Mehta (Jul 10)
- Re: OpenSSH User Enumeration Time-Based Attack Jann Horn (Jul 11)
- Re: OpenSSH User Enumeration Time-Based Attack Curesec Research Team (Jul 13)
- Re: OpenSSH User Enumeration Time-Based Attack Florian Reinholz (Jul 13)
- Re: OpenSSH User Enumeration Time-Based Attack Grandma Eubanks (Jul 13)
- <Possible follow-ups>
- Re: OpenSSH User Enumeration Time-Based Attack security curmudgeon (Jul 13)