Description
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-425-1 | libssh security update |
Debian DSA |
DSA-3488-1 | libssh security update |
EUVD |
EUVD-2016-0763 | libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug." |
Ubuntu USN |
USN-2912-1 | libssh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T22:30:04.158Z
Reserved: 2015-12-16T00:00:00.000Z
Link: CVE-2016-0739
No data.
Status : Modified
Published: 2016-04-13T17:59:08.413
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-0739
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN