UBUNTU-CVE-2017-2659

Source
https://ubuntu.com/security/CVE-2017-2659
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2659.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-2659
Upstream
Withdrawn
2025-07-18T16:43:48Z
Published
2019-03-21T15:59:00Z
Modified
2025-07-16T08:13:11.806859Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.

References

Affected packages

Ubuntu:18.04:LTS / dropbear

Package

Name
dropbear
Purl
pkg:deb/ubuntu/dropbear@2017.75-3build1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2017.75-3build1

Affected versions

2017.*
2017.75-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2017.75-3build1",
            "binary_name": "dropbear"
        },
        {
            "binary_version": "2017.75-3build1",
            "binary_name": "dropbear-bin"
        },
        {
            "binary_version": "2017.75-3build1",
            "binary_name": "dropbear-bin-dbgsym"
        },
        {
            "binary_version": "2017.75-3build1",
            "binary_name": "dropbear-initramfs"
        },
        {
            "binary_version": "2017.75-3build1",
            "binary_name": "dropbear-run"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2659.json"