-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0458
                          libssh2 security update
                             24 February 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libssh2
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Reduced Security -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0787  

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3487

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running libssh2 check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3487-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 23, 2016                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : libssh2
CVE ID         : CVE-2016-0787
Debian Bug     : 815662

Andreas Schneider reported that libssh2, a SSH2 client-side library,
passes the number of bytes to a function that expects number of bits
during the SSHv2 handshake when libssh2 is to get a suitable value for
'group order' in the Diffie-Hellman negotiation. This weakens
significantly the handshake security, potentially allowing an
eavesdropper with enough resources to decrypt or intercept SSH sessions.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.2-1.1+deb7u2.

For the stable distribution (jessie), this problem has been fixed in
version 1.4.3-4.1+deb8u1.

We recommend that you upgrade your libssh2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=6/3s
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6Gt3
-----END PGP SIGNATURE-----