{"id":"ALPINE-CVE-2016-6210","details":"sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.","modified":"2025-11-19T06:02:28.825952Z","published":"2017-02-13T17:59:00.153Z","upstream":["CVE-2016-6210"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2016-6210"}],"affected":[{"package":{"name":"openssh","ecosystem":"Alpine:v3.2","purl":"pkg:apk/alpine/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8_p1-r7"}]}],"versions":["5.1_p1-r1","5.1_p1-r2","5.1p1-r0","5.2_p1-r0","5.2_p1-r1","5.2_p1-r2","5.2_p1-r3","5.3_p1-r3","5.4_p1-r0","5.4_p1-r1","5.4_p1-r2","5.4_p1-r3","5.5_p1-r0","5.6_p1-r0","5.6_p1-r1","5.8_p1-r0","5.8_p1-r1","5.8_p1-r2","5.8_p2-r0","5.8_p2-r1","5.8_p2-r2","5.9_p1-r0","5.9_p1-r1","5.9_p1-r2","6.0_p1-r0","6.1_p1-r0","6.1_p1-r1","6.1_p1-r2","6.2_p1-r0","6.2_p2-r0","6.2_p2-r1","6.2_p2-r2","6.3_p1-r0","6.3_p1-r1","6.3_p1-r2","6.4_p1-r0","6.4_p1-r1","6.6_p1-r0","6.6_p1-r1","6.6_p1-r2","6.6_p1-r3","6.6_p1-r4","6.6_p1-r5","6.6_p1-r6","6.7_p1-r0","6.8_p1-r0","6.8_p1-r1","6.8_p1-r2","6.8_p1-r3","6.8_p1-r4","6.8_p1-r5","6.8_p1-r6"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-6210.json"}},{"package":{"name":"openssh","ecosystem":"Alpine:v3.3","purl":"pkg:apk/alpine/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.2_p2-r1"}]}],"versions":["5.1_p1-r1","5.1_p1-r2","5.1p1-r0","5.2_p1-r0","5.2_p1-r1","5.2_p1-r2","5.2_p1-r3","5.3_p1-r3","5.4_p1-r0","5.4_p1-r1","5.4_p1-r2","5.4_p1-r3","5.5_p1-r0","5.6_p1-r0","5.6_p1-r1","5.8_p1-r0","5.8_p1-r1","5.8_p1-r2","5.8_p2-r0","5.8_p2-r1","5.8_p2-r2","5.9_p1-r0","5.9_p1-r1","5.9_p1-r2","6.0_p1-r0","6.1_p1-r0","6.1_p1-r1","6.1_p1-r2","6.2_p1-r0","6.2_p2-r0","6.2_p2-r1","6.2_p2-r2","6.3_p1-r0","6.3_p1-r1","6.3_p1-r2","6.4_p1-r0","6.4_p1-r1","6.6_p1-r0","6.6_p1-r1","6.6_p1-r2","6.6_p1-r3","6.6_p1-r4","6.6_p1-r5","6.6_p1-r6","6.7_p1-r0","6.8_p1-r0","6.8_p1-r1","6.8_p1-r2","6.9_p1-r0","6.9_p1-r1","6.9_p1-r2","6.9_p1-r3","6.9_p1-r4","6.9_p1-r5","7.1_p1-r0","7.1_p1-r1","7.1_p2-r0","7.2_p1-r0","7.2_p2-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-6210.json"}},{"package":{"name":"openssh","ecosystem":"Alpine:v3.4","purl":"pkg:apk/alpine/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.2_p2-r1"}]}],"versions":["5.1_p1-r1","5.1_p1-r2","5.1p1-r0","5.2_p1-r0","5.2_p1-r1","5.2_p1-r2","5.2_p1-r3","5.3_p1-r3","5.4_p1-r0","5.4_p1-r1","5.4_p1-r2","5.4_p1-r3","5.5_p1-r0","5.6_p1-r0","5.6_p1-r1","5.8_p1-r0","5.8_p1-r1","5.8_p1-r2","5.8_p2-r0","5.8_p2-r1","5.8_p2-r2","5.9_p1-r0","5.9_p1-r1","5.9_p1-r2","6.0_p1-r0","6.1_p1-r0","6.1_p1-r1","6.1_p1-r2","6.2_p1-r0","6.2_p2-r0","6.2_p2-r1","6.2_p2-r2","6.3_p1-r0","6.3_p1-r1","6.3_p1-r2","6.4_p1-r0","6.4_p1-r1","6.6_p1-r0","6.6_p1-r1","6.6_p1-r2","6.6_p1-r3","6.6_p1-r4","6.6_p1-r5","6.6_p1-r6","6.7_p1-r0","6.8_p1-r0","6.8_p1-r1","6.8_p1-r2","6.9_p1-r0","6.9_p1-r1","6.9_p1-r2","6.9_p1-r3","6.9_p1-r4","6.9_p1-r5","7.1_p1-r0","7.1_p1-r1","7.1_p2-r0","7.2_p1-r0","7.2_p2-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-6210.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}