Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0084 Multiple vulnerabilities have been identified in Ansible prior to version 1.9.2. 17 August 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Ansible Operating System: UNIX variants (UNIX, Linux, OSX) Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-3908 Member content until: Wednesday, September 16 2015 OVERVIEW Multiple vulnerabilities have been identified in Ansible prior to version 1.9.2. [1] IMPACT Red Hat has provided the following details regarding the first vulnerability: CVE-2015-3908: "Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." [2] Ansible has provided the following details regarding the second vulnerability: CVE number pending: "Improprer symlink handling in zone, jail, and chroot connection plugins could lead to escape from confined environment - resolved in Ansible 1.9.2." [1] MITIGATION Ansible advises users these issues are fixed in version 1.9.2. [1] REFERENCES [1] ANSIBLE SECURITY http://www.ansible.com/security [2] CVE-2015-3908 https://access.redhat.com/security/cve/CVE-2015-3908 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVdGGn36ZAP0PgtI9AQIiNg//ZFhtXOLZV5yjZpIWvs5tP6ndvhPTT5ZA b989sNOjm6BPd0Del0WFRumRwCr9abwZYlpQC5RMHhlyTV2Rst0dL9jnVUyG4dKy 0OK+y7vkbWta1NSggOfYJyvy3//M6Hg1PQgmI02Bf4t64bZ1zkWq3EQocs5D80AT A8Y73XSYsKv2+htwhe2gD4yrsp8Ql7Y4EEmWK8Q7BFMOUDjK3f+0vhcqRX1dVMzy CDZ2XyPU8Vd/UZ9ZJ8iQu+ZRFT/3wOzz6QiraGgmKC+rXJrK5/7fNWZy0opEq27Z s+I0GK6wOWItCXbl5+7Bt0bBaKWd4jEXMMUWjZKEn7Z6eTcaazPBU+Pz5vgNlMYt 7qyXSHEsM0Ck36xqvfgMQNyxgAVkrV99iE14LD9nddTBgcNkWcUwj9GrnJWObwyL y3n6HGMNTdN0nf6IbBvs1eheiy7bga08sqheDAtYdaYm6qzvl30qxn8+ab7jNZCn KsgIOBGWV/0VoIcSdCi9Vka/mfTDLxbXHKN+r/UaoUzsFmjgeRGpz1YwgFfGvbYZ unYIHGLTRle52FzEJtS3KYzg0fdfo/6Wc2I4fm+2Dh37JLGbYniQQhvYesLXb373 dtwlDUmSFkhqOjr20CUkhSo2TVE2KUcb6Jio3HSgCe0WsfA+F4Of0n7kvSyi+gnb loPTWxoLAoM= =Hkx/ -----END PGP SIGNATURE-----