Loading
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
Use CWE-203, Openbsd vendor hub and Openssh product page to widen CVE-2003-0190 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-6387, CVE-2026-35385 and CVE-2023-51767 for nearby disclosures in the same product family.