The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151943.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152362.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153933.html | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3182 | Third Party Advisory |
http://www.libssh2.org/adv_20150311.html | Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:148 | Broken Link |
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | |
http://www.securityfocus.com/bid/73061 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
13 Feb 2023, 00:46
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet. |
02 Feb 2023, 20:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A flaw was found in the way the kex_agree_methods() function of libssh2 performed a key exchange when negotiating a new SSH session. A man-in-the-middle attacker could use a crafted SSH_MSG_KEXINIT packet to crash a connecting libssh2 client. |
Information
Published : 2015-03-13 14:59
Updated : 2023-12-10 11:31
NVD link : CVE-2015-1782
Mitre link : CVE-2015-1782
CVE.ORG link : CVE-2015-1782
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
libssh2
- libssh2
CWE
CWE-20
Improper Input Validation