libssh2 is vulnerable to weak handshakes. The vulnerability happens because diffie_hellman_sha256 function in kex.c
in libssh2 generates secret key of length 128 or 256 bits instead of 1023 or 2047 bits, allowing the attackers to intercept or decrypt SSH sessions using bits/bytes confusion bug.
CPE | Name | Operator | Version |
---|---|---|---|
libssh2 | eq | 1.2.2__11.el6_3 | |
libssh2 | eq | 1.4.2__1.el6 | |
libssh2 | eq | 1.2.2__7.el6 | |
libssh2 | eq | 1.4.2__1.el6_6.1 | |
libssh2 | eq | 1.2.2__7.el6_2.3 | |
libssh2 | eq | 1.2.2__7.el6_1.1 |