{"api_version":"1","generated_at":"2026-04-22T19:04:39+00:00","cve":"CVE-2017-2659","urls":{"html":"https://cve.report/CVE-2017-2659","api":"https://cve.report/api/cve/CVE-2017-2659.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-2659","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-2659"},"summary":{"title":"CVE-2017-2659","description":"It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2019-03-21 15:59:00","updated_at":"2019-10-09 23:27:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86","name":"https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"1433824 – (CVE-2017-2659) CVE-2017-2659 dropbear: Information leak when given invalid username","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-2659","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2659","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"2659","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dropbear_ssh_project","cpe5":"dropbear_ssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2659","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dropbear_ssh_project","cpe5":"dropbear_ssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2017-2659","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"[UNKNOWN]","product":{"product_data":[{"product_name":"dropbear","version":{"version_data":[{"version_value":"fixed in 2013.59"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-209"}]}]},"references":{"reference_data":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659","refsource":"CONFIRM"},{"url":"https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86","refsource":"MISC","name":"https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86"}]},"description":{"description_data":[{"lang":"eng","value":"It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts."}]},"impact":{"cvss":[[{"vectorString":"5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.0"}]]}},"nvd":{"publishedDate":"2019-03-21 15:59:00","lastModifiedDate":"2019-10-09 23:27:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*","versionEndExcluding":"2013.59","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"2659","Ordinal":"98798","Title":"CVE-2017-2659","CVE":"CVE-2017-2659","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"2659","Ordinal":"1","NoteData":"It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"2659","Ordinal":"2","NoteData":"2019-03-20","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"2659","Ordinal":"3","NoteData":"2019-03-20","Type":"Other","Title":"Modified"}]}}}