CVE-2016-0739

Priority
Medium
Description
libssh before 0.7.3 improperly truncates ephemeral secrets generated for
the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange
methods to 128 bits, which makes it easier for man-in-the-middle attackers
to decrypt or intercept SSH sessions via unspecified vectors, aka a
"bits/bytes confusion bug."
References
Notes
 tyhicks> affects "all versions of libssh 0.1 and later"
Assigned-to
mdeslaur
Package
Upstream:released (0.7.3)
Ubuntu 14.04 LTS (Trusty Tahr):released (0.6.1-0ubuntu3.3)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.6.3-4.2ubuntu1)
Ubuntu 17.04 (Zesty Zapus):released (0.6.3-4.2ubuntu1)
More Information

Updated: 2017-12-15 20:34:46 UTC (commit 13913)