CVE-2016-0787
Bug #1664812 reported by
Brian Morton
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libssh2 (Ubuntu) |
Fix Released
|
Medium
|
Brian Morton |
Bug Description
The diffie_
CVE References
Changed in libssh2 (Ubuntu): | |
assignee: | nobody → Brian Morton (rokclimb15) |
information type: | Public → Public Security |
Changed in libssh2 (Ubuntu): | |
status: | New → Confirmed |
Changed in libssh2 (Ubuntu): | |
importance: | Undecided → Medium |
To post a comment you must log in.
Debdiff for Yakkety
The vuln has no specific known attack methods so there is no public exploit available. Package tests have passed and I used a somewhat unusual method to explicitly regression test. Package php-ssh2 depends on libssh2.
<?php
$server= "ssh.host. name";
// DH Group1 SHA1 uses patched sha1 KEX
$methods = array( hellman- group1- sha1'
'kex' => 'diffie-
);
// Make our connection $server, 22, $methods);
$connection = ssh2_connect(
if (!$connection) die('Connection failed');
$methods_neg = ssh2_methods_ negotiated( $connection) ; neg['kex' ]}\n"; neg["client_ to_server" ]["crypt" ]}\n"; neg["client_ to_server" ]["comp" ]}\n"; neg["server_ to_client" ]["crypt" ]}\n"; neg["server_ to_client" ]["comp" ]}\n";
echo "Keys negotiated with: {$methods_
echo "Client-to-server uses these methods:\n";
echo " Encryption: {$methods_
echo " Compression: {$methods_
echo "Server-to-client uses these methods:\n";
echo " Encryption: {$methods_
echo " Compression: {$methods_