The CORE SDI team has found a vulnerability in the SSH 1.5 protocol that allows an attacker to retrieve the session key, which could then allow them to decrypt network traffic. This attack was discovered by David Bleichenbacher. . . .
The CORE SDI team has found a vulnerability in the SSH 1.5 protocol that allows an attacker to retrieve the session key, which could then allow them to decrypt network traffic. This attack was discovered by David Bleichenbacher.