CVE-2015-1782

The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

History

13 Feb 2023, 00:46

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1199511', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1199511', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2015-1782', 'name': 'https://access.redhat.com/security/cve/CVE-2015-1782', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:2140', 'name': 'https://access.redhat.com/errata/RHSA-2015:2140', 'tags': [], 'refsource': 'MISC'}
Summary A flaw was found in the way the kex_agree_methods() function of libssh2 performed a key exchange when negotiating a new SSH session. A man-in-the-middle attacker could use a crafted SSH_MSG_KEXINIT packet to crash a connecting libssh2 client. The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.

02 Feb 2023, 20:20

Type Values Removed Values Added
References
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1199511 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2015-1782 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:2140 -
Summary The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet. A flaw was found in the way the kex_agree_methods() function of libssh2 performed a key exchange when negotiating a new SSH session. A man-in-the-middle attacker could use a crafted SSH_MSG_KEXINIT packet to crash a connecting libssh2 client.

Information

Published : 2015-03-13 14:59

Updated : 2023-12-10 11:31


NVD link : CVE-2015-1782

Mitre link : CVE-2015-1782

CVE.ORG link : CVE-2015-1782


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

libssh2

  • libssh2
CWE
CWE-20

Improper Input Validation