CVE-2004-2760

NameCVE-2004-2760
Descriptionsshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190. NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssh (PTS)jessie, jessie (lts)1:6.7p1-5+deb8u10fixed
stretch (security)1:7.4p1-10+deb9u6fixed
stretch (lts), stretch1:7.4p1-10+deb9u9fixed
buster (security), buster, buster (lts)1:7.9p1-10+deb10u4fixed
bullseye (security), bullseye1:8.4p1-5+deb11u3fixed
bookworm (security), bookworm1:9.2p1-2+deb12u3fixed
sid, trixie1:9.9p1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensshsource(unstable)1:3.6p1-1unimportant

Search for package or bug name: Reporting problems