Information Exposure Affecting libssh package, versions [,0.7.4)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
3.66% (88th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-LIBSSH-2379521
  • published26 Jan 2022
  • disclosed13 Apr 2016
  • creditUnknown

Introduced: 13 Apr 2016

CVE-2016-0739  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade libssh to version 0.7.4 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."

References

CVSS Base Scores

version 3.1