Description
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-426-1 | libssh2 security update |
Debian DSA |
DSA-3487-1 | libssh2 security update |
EUVD |
EUVD-2016-0800 | The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug." |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T22:30:04.675Z
Reserved: 2015-12-16T00:00:00.000Z
Link: CVE-2016-0787
No data.
Status : Modified
Published: 2016-04-13T17:59:10.930
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-0787
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD