-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2015.0084
         Multiple vulnerabilities have been identified in Ansible
                          prior to version 1.9.2.
                              17 August 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Ansible
Operating System:     UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Provide Misleading Information -- Remote/Unauthenticated
                      Unauthorised Access            -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-3908  
Member content until: Wednesday, September 16 2015

OVERVIEW

        Multiple vulnerabilities have been identified in Ansible prior to 
        version 1.9.2. [1]


IMPACT

        Red Hat has provided the following details regarding the first 
        vulnerability:
        
        CVE-2015-3908: "Ansible before 1.9.2 does not verify that the server
        hostname matches a domain name in the subject's Common Name (CN) or
        subjectAltName field of the X.509 certificate, which allows 
        man-in-the-middle attackers to spoof SSL servers via an arbitrary 
        valid certificate." [2]
        
        Ansible has provided the following details regarding the second 
        vulnerability:
        
        CVE number pending: "Improprer symlink handling in zone, jail, and 
        chroot connection plugins could lead to escape from confined 
        environment - resolved in Ansible 1.9.2." [1]


MITIGATION

        Ansible advises users these issues are fixed in version 1.9.2. [1]


REFERENCES

        [1] ANSIBLE SECURITY
            http://www.ansible.com/security

        [2] CVE-2015-3908
            https://access.redhat.com/security/cve/CVE-2015-3908

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVdGGn36ZAP0PgtI9AQIiNg//ZFhtXOLZV5yjZpIWvs5tP6ndvhPTT5ZA
b989sNOjm6BPd0Del0WFRumRwCr9abwZYlpQC5RMHhlyTV2Rst0dL9jnVUyG4dKy
0OK+y7vkbWta1NSggOfYJyvy3//M6Hg1PQgmI02Bf4t64bZ1zkWq3EQocs5D80AT
A8Y73XSYsKv2+htwhe2gD4yrsp8Ql7Y4EEmWK8Q7BFMOUDjK3f+0vhcqRX1dVMzy
CDZ2XyPU8Vd/UZ9ZJ8iQu+ZRFT/3wOzz6QiraGgmKC+rXJrK5/7fNWZy0opEq27Z
s+I0GK6wOWItCXbl5+7Bt0bBaKWd4jEXMMUWjZKEn7Z6eTcaazPBU+Pz5vgNlMYt
7qyXSHEsM0Ck36xqvfgMQNyxgAVkrV99iE14LD9nddTBgcNkWcUwj9GrnJWObwyL
y3n6HGMNTdN0nf6IbBvs1eheiy7bga08sqheDAtYdaYm6qzvl30qxn8+ab7jNZCn
KsgIOBGWV/0VoIcSdCi9Vka/mfTDLxbXHKN+r/UaoUzsFmjgeRGpz1YwgFfGvbYZ
unYIHGLTRle52FzEJtS3KYzg0fdfo/6Wc2I4fm+2Dh37JLGbYniQQhvYesLXb373
dtwlDUmSFkhqOjr20CUkhSo2TVE2KUcb6Jio3HSgCe0WsfA+F4Of0n7kvSyi+gnb
loPTWxoLAoM=
=Hkx/
-----END PGP SIGNATURE-----