{
    "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2016-20012",
        "STATE": "PUBLIC"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "n/a",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_value": "n/a"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "n/a"
                }
            ]
        }
    },
    "data_format": "MITRE",
    "data_type": "CVE",
    "data_version": "4.0",
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "** DISPUTED ** OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product."
            }
        ]
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "n/a"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "url": "https://github.com/openssh/openssh-portable/pull/270",
                "refsource": "MISC",
                "name": "https://github.com/openssh/openssh-portable/pull/270"
            },
            {
                "url": "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
                "refsource": "MISC",
                "name": "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265"
            },
            {
                "url": "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
                "refsource": "MISC",
                "name": "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak"
            },
            {
                "url": "https://rushter.com/blog/public-ssh-keys/",
                "refsource": "MISC",
                "name": "https://rushter.com/blog/public-ssh-keys/"
            },
            {
                "refsource": "CONFIRM",
                "name": "https://security.netapp.com/advisory/ntap-20211014-0005/",
                "url": "https://security.netapp.com/advisory/ntap-20211014-0005/"
            },
            {
                "refsource": "MISC",
                "name": "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
                "url": "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097"
            },
            {
                "refsource": "MISC",
                "name": "https://www.openwall.com/lists/oss-security/2018/08/24/1",
                "url": "https://www.openwall.com/lists/oss-security/2018/08/24/1"
            },
            {
                "refsource": "MISC",
                "name": "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
                "url": "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185"
            }
        ]
    }
}