{ "schema_version": "1.4.0", "id": "GHSA-v7q8-7g48-2272", "modified": "2025-04-12T12:58:38Z", "published": "2022-05-17T00:16:49Z", "aliases": [ "CVE-2016-0739" ], "details": "libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0739" }, { "type": "WEB", "url": "https://puppet.com/security/cve/CVE-2016-0739" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201606-12" }, { "type": "WEB", "url": "https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release" }, { "type": "WEB", "url": "https://www.libssh.org/security/advisories/CVE-2016-0739.txt" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0566.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3488" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2912-1" } ], "database_specific": { "cwe_ids": [ "CWE-200" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-04-13T17:59:00Z" } }