Hi Jacob, all,

On Tue, Jul 02, 2024 at 09:01:48PM -0500, Jacob Bachmeyer wrote:
> A thought occurred to me late last night:  this exploit required the use of
> a very long fake user name (~128KB).

A side note, just in case: only our exploit against Ubuntu 6.06.1 uses a
very long user name; our exploits against Debian 3.0r6 and Debian 12.5.0
simply use "nobody" (but it could be any existing user name).

> If there currently really is no limit at all, outrageously long fake
> usernames (limited only by bandwidth and LoginGraceTime?)

There are various already-existing limits along the way, but the first
one is PACKET_MAX_SIZE, which limits the size of a packet (and hence the
strings it contains) to 256KB (and this is pre-authentication, so no
compression tricks are possible, here).

Thank you very much! With best regards,

-- 
the Qualys Security Advisory team

Reply via email to