Описание
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1.7.0-1ubuntu1 |
esm-apps/xenial | released | 1.5.0-2ubuntu0.1 |
esm-infra-legacy/trusty | released | 1.4.3-2ubuntu0.1 |
precise | released | 1.2.8-2ubuntu0.1 |
trusty | released | 1.4.3-2ubuntu0.1 |
trusty/esm | released | 1.4.3-2ubuntu0.1 |
upstream | released | 1.7.0 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | ignored | end of life |
Показывать по
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 im ...
4.3 Medium
CVSS2
5.9 Medium
CVSS3