Information Exposure Affecting libssh2 package, versions <1.4.3-4.1+deb8u1
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Threat Intelligence
EPSS
0.55% (78th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-LIBSSH2-279738
- published 13 Apr 2016
- disclosed 13 Apr 2016
Introduced: 13 Apr 2016
CVE-2016-0787 Open this link in a new tabHow to fix?
Upgrade Debian:8
libssh2
to version 1.4.3-4.1+deb8u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2
package and not the libssh2
package as distributed by Debian
.
See How to fix?
for Debian:8
relevant fixed versions and status.
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
References
- https://security-tracker.debian.org/tracker/CVE-2016-0787
- https://bto.bluecoat.com/security-advisory/sa120
- https://kc.mcafee.com/corporate/index?page=content&id=SB10156
- https://puppet.com/security/cve/CVE-2016-0787
- https://www.libssh2.org/adv_20160223.html
- https://www.libssh2.org/CVE-2016-0787.patch
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787
- http://www.debian.org/security/2016/dsa-3487
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html
- https://security.gentoo.org/glsa/201606-12
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82514
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0787