svn commit: r410177 - head/security/vuxml

Raphael Kubo da Costa rakuco at FreeBSD.org
Sat Mar 5 13:09:50 UTC 2016


Author: rakuco
Date: Sat Mar  5 13:09:48 2016
New Revision: 410177
URL: https://svnweb.freebsd.org/changeset/ports/410177

Log:
  Add entry for security/libssh's CVE-2016-0739.
  
  This was fixed in r409932, but the 2016Q1 branch is still vulnerable.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Mar  5 12:46:59 2016	(r410176)
+++ head/security/vuxml/vuln.xml	Sat Mar  5 13:09:48 2016	(r410177)
@@ -58,6 +58,44 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="6b3591ea-e2d2-11e5-a6be-5453ed2e2b49">
+    <topic>libssh -- weak Diffie-Hellman secret generation</topic>
+    <affects>
+      <package>
+	<name>libssh</name>
+	<range><lt>0.7.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Andreas Schneider reports:</p>
+	<blockquote cite="https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/">
+	  <p>libssh versions 0.1 and above have a bits/bytes confusion bug and
+	  generate the an anormaly short ephemeral secret for the
+	  diffie-hellman-group1 and diffie-hellman-group14 key exchange
+	  methods. The resulting secret is 128 bits long, instead of the
+	  recommended sizes of 1024 and 2048 bits respectively. There are
+	  practical algorithms (Baby steps/Giant steps, Pollard’s rho) that can
+	  solve this problem in O(2^63) operations.</p>
+	  <p>Both client and server are are vulnerable, pre-authentication.
+	  This vulnerability could be exploited by an eavesdropper with enough
+	  resources to decrypt or intercept SSH sessions. The bug was found
+	  during an internal code review by Aris Adamantiadis of the libssh
+	  team.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-0739</cvename>
+      <url>https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0739</url>
+      <url>https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/</url>
+    </references>
+    <dates>
+      <discovery>2016-02-23</discovery>
+      <entry>2016-03-05</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7d09b9ee-e0ba-11e5-abc4-6fb07af136d2">
     <topic>exim -- local privilleges escalation</topic>
     <affects>


More information about the svn-ports-all mailing list