Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

             Authentication bypass patched in AsyncSSH 1.12.1
                             10 December 2018


        AusCERT Security Bulletin Summary

Product:           AsyncSSH
Publisher:         AsyncSSH
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   BSD variants
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-7749  

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

AsyncSSH version 1.12.1 is now available on Github and PyPI, with new features
and enhancements, and an important security fix for those using AsyncSSH
server functionality. If you are using AsyncSSH as an SSH server, I strongly
encourage you to upgrade to this release. 

Here's a list of changes since 1.12.0: 

* Implemented a fix for CVE-2018-7749, where a modified SSH client could 
  request that an AsyncSSH server perform operations before authentication 
  had completed. Thanks go to Matthijs Kooijman for discovering and 
  reporting this issue and helping to review the fix. 

* Added a non-blocking collect_output() method to SSHClientProcess to 
  allow applications to retrieve data received on an output stream 
  without blocking. This call can be called multiple times and freely 
  intermixed with regular read calls with a guarantee that output will 
  always be returned in order and without duplication. 

* Updated debug logging implementation to make it more maintainable, and 
  to fix an issue where unprocessed packets were not logged in some cases. 

* Extended the support below for non-ASCII characters in comments to apply 
  to X.509 certificates, allowing an optional encoding to be passed in to 
  get_comment() and set_comment() and a get_comment_bytes() function to 
  get the raw comment bytes without performing Unicode decoding. 

* Fixed an issue where a UnicodeDecodeError could be reported in some 
  cases instead of a KeyEncryptionError when a private key was imported 
  using the wrong passphrase. 

* Fixed the reporting of the MAC algorithm selected during key exchange to 
  properly report the cipher name for GCM and Chacha ciphers that don't 
  use a separate MAC algorithm. The correct value was being returned in 
  queries after the key exchange was complete, but the logging was being 
  done before this adjustment was made. 

* Fixed the documentation of connection_made() in SSHSession subclasses 
  to properly reflect the type of SSHChannel objects passed to them. 

Downloads can be found in the usual place: 

Home page: http://asyncssh.readthedocs.io 
PyPI: https://pypi.python.org/pypi/asyncssh 
GitHub: https://github.com/ronf/asyncssh 

Please let me know if you have any questions or problems with this new release! 
Ron Frederick 

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967