libssh prior to 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle malicious users to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat enterprise linux 7.0 |
||
canonical ubuntu linux 15.10 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 14.04 |
||
libssh libssh |
||
fedoraproject fedora 23 |
||
fedoraproject fedora 22 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |