Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3182-1: libssh2 security update

    Date
    151
    Posted By
    Mariusz Ziulek reported that libssh2, a SSH2 client-side library, was reading and using the SSH_MSG_KEXINIT packet without doing sufficient range checks when negotiating a new SSH session with a remote server. A malicious attacker could man in the middle a real server and cause a
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3182-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                      Salvatore Bonaccorso
    March 11, 2015                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : libssh2
    CVE ID         : CVE-2015-1782
    Debian Bug     : 780249
    
    Mariusz Ziulek reported that libssh2, a SSH2 client-side library, was
    reading and using the SSH_MSG_KEXINIT packet without doing sufficient
    range checks when negotiating a new SSH session with a remote server. A
    malicious attacker could man in the middle a real server and cause a
    client using the libssh2 library to crash (denial of service) or
    otherwise read and use unintended memory areas in this process.
    
    For the stable distribution (wheezy), this problem has been fixed in
    version 1.4.2-1.1+deb7u1.
    
    We recommend that you upgrade your libssh2 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"45","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.