A flaw was found in the way the kex_agree_methods() function of libssh2 performed a key exchange when negotiating a new SSH session. A man-in-the-middle attacker could use a crafted SSH_MSG_KEXINIT packet to crash a connecting libssh2 client.
Find out more about CVE-2015-1782 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 7.8 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:N/I:N/A:C |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (libssh4) | RHSA-2015:2140 | 2015-11-19 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 6 | libssh4 | Will not fix |