OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)
OpenSSH has a default value of six authentication tries before it will close the connection (the ssh client allows only three password entries per default). With this vulnerability an attacker is able to request as many password prompts limited by the “login graced time” setting, that is set to two minutes by default.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.