The (1) elog.c and (2) elogd.c components in elog before 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published: 2006-02-13T11:00:00

Updated: 2024-08-07T16:41:28.798Z

Reserved: 2006-02-08T00:00:00

Link: CVE-2006-0599

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-02-13T11:06:00.000

Modified: 2023-11-07T01:58:25.257

Link: CVE-2006-0599

cve-icon Redhat

No data.