The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Libssh2 Subscribe
Libssh2 Subscribe
Opensuse Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-426-1 libssh2 security update
Debian DSA Debian DSA DSA-3487-1 libssh2 security update
EUVD EUVD EUVD-2016-0800 The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T22:30:04.675Z

Reserved: 2015-12-16T00:00:00

Link: CVE-2016-0787

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-04-13T17:59:10.930

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-0787

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-02-23T00:00:00Z

Links: CVE-2016-0787 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses