Lucene search

K
prionPRIOn knowledge basePRION:CVE-2016-0787
HistoryApr 13, 2016 - 5:59 p.m.

Type confusion

2016-04-1317:59:00
PRIOn knowledge base
www.prio-n.com
8

6.7 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.6%

The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a “bits/bytes confusion bug.”