{"id":"CVE-2016-0787","details":"The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"","modified":"2026-04-16T06:19:02.645739255Z","published":"2016-04-13T17:59:10.930Z","related":["SUSE-SU-2016:0718-1","SUSE-SU-2016:0723-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","openSUSE-SU-2024:10190-1"],"references":[{"type":"WEB","url":"https://puppet.com/security/cve/CVE-2016-0787"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/82514"},{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10156"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3487"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201606-12"},{"type":"ADVISORY","url":"https://www.libssh2.org/adv_20160223.html"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa120"},{"type":"FIX","url":"https://www.libssh2.org/CVE-2016-0787.patch"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libssh2/libssh2","events":[{"introduced":"0"},{"last_affected":"cbd5f72339dae6bfc587f4486f4349dd1d61f9b7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.6.0"}]}}],"versions":["RELEASE.0.1","RELEASE.0.10","RELEASE.0.11","RELEASE.0.12","RELEASE.0.13","RELEASE.0.14","RELEASE.0.15","RELEASE.0.16","RELEASE.0.17","RELEASE.0.18","RELEASE.0.3","RELEASE.0.5","RELEASE.0.6","RELEASE.0.7","RELEASE.0.8","RELEASE.1.0","RELEASE.1.1","beforenb-0.14","beforenb2-0.14","libssh2-1.2","libssh2-1.2.1","libssh2-1.2.3","libssh2-1.2.4","libssh2-1.2.5","libssh2-1.2.6","libssh2-1.2.7","libssh2-1.2.8","libssh2-1.2.9","libssh2-1.3.0","libssh2-1.4.0","libssh2-1.4.1","libssh2-1.4.2","libssh2-1.4.3","libssh2-1.5.0","libssh2-1.6.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0787.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"22"}]},{"events":[{"introduced":"0"},{"last_affected":"23"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}