First published: Wed Apr 13 2016(Updated: )
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =22 | |
Fedora | =23 | |
SUSE Linux | =13.2 | |
Oracle Libssh2 | <=1.6.0 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0787 is considered to have a high severity due to its potential impact on SSH session confidentiality.
To fix CVE-2016-0787, upgrade to libssh2 version 1.7.0 or later, and ensure you are using secure cryptographic settings.
CVE-2016-0787 affects libssh2 versions up to 1.6.0 and multiple Linux distributions including Fedora 22, Fedora 23, openSUSE 13.2, and Debian 7.0 or 8.0.
CVE-2016-0787 makes systems vulnerable to man-in-the-middle attacks that can lead to session decryption or interception.
While not classified as critical, CVE-2016-0787 poses a significant risk due to its exploitation potential affecting SSH communications.