ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109786760926133&w=2 | Third Party Advisory |
http://security.lss.hr/index.php?page=details&ID=LSS-2004-10-02 | Broken Link Exploit Patch Vendor Advisory |
http://securitytracker.com/id?1011687 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.securityfocus.com/bid/11430 | Broken Link Exploit Third Party Advisory VDB Entry Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17724 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2004-10-15 04:00
Updated : 2024-02-15 18:46
NVD link : CVE-2004-1602
Mitre link : CVE-2004-1602
CVE.ORG link : CVE-2004-1602
JSON object : View
Products Affected
proftpd
- proftpd
CWE
CWE-203
Observable Discrepancy