SSH Protocol 1.5 Session Key Recovery Vulnerability

The CORE SDI team has found a vulnerability in the SSH 1.5 protocol that allows an attacker to retrieve the session key, which could then allow them to decrypt network traffic. This attack was discovered by David Bleichenbacher. . . .