The diffie_hellman_sha256 function in kex.c in libssh2 prior to 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle malicious users to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fedoraproject fedora 23 |
||
fedoraproject fedora 22 |
||
opensuse opensuse 13.2 |
||
libssh2 libssh2 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |