Total vulnerabilities in the database
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Software | From | Fixed in |
---|---|---|
fedoraproject / fedora | 22 | 22.x |
fedoraproject / fedora | 23 | 23.x |
opensuse / opensuse | 13.2 | 13.2.x |
libssh2 / libssh2 | - | 1.6.0.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 7.0 | 7.0.x |