Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.882419
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for libssh2 CESA-2016:0428 centos7
Zusammenfassung:Check the version of libssh2
Beschreibung:Summary:
Check the version of libssh2

Vulnerability Insight:
The libssh2 packages provide a library
that implements the SSHv2 protocol.

A type confusion issue was found in the way libssh2 generated ephemeral
secrets for the diffie-hellman-group1 and diffie-hellman-group14 key
exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use
significantly less secure random parameters. (CVE-2016-0787)

Red Hat would like to thank Aris Adamantiadis for reporting this issue.

All libssh2 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing these
updated packages, all running applications using libssh2 must be restarted
for this update to take effect.

Affected Software/OS:
libssh2 on CentOS 7

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-0787
BugTraq ID: 82514
http://www.securityfocus.com/bid/82514
Debian Security Information: DSA-3487 (Google Search)
http://www.debian.org/security/2016/dsa-3487
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html
https://security.gentoo.org/glsa/201606-12
SuSE Security Announcement: openSUSE-SU-2016:0639 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html
CopyrightCopyright (C) 2016 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.