Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3806 Authentication bypass patched in AsyncSSH 1.12.1 10 December 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: AsyncSSH Publisher: AsyncSSH Operating System: UNIX variants (UNIX, Linux, OSX) Windows BSD variants Impact/Access: Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-7749 Original Bulletin: https://groups.google.com/d/msg/asyncssh-announce/57_5O7kiHSA/8BXZ_hxHAQAJ - --------------------------BEGIN INCLUDED TEXT-------------------- AsyncSSH version 1.12.1 is now available on Github and PyPI, with new features and enhancements, and an important security fix for those using AsyncSSH server functionality. If you are using AsyncSSH as an SSH server, I strongly encourage you to upgrade to this release. Here's a list of changes since 1.12.0: * Implemented a fix for CVE-2018-7749, where a modified SSH client could request that an AsyncSSH server perform operations before authentication had completed. Thanks go to Matthijs Kooijman for discovering and reporting this issue and helping to review the fix. * Added a non-blocking collect_output() method to SSHClientProcess to allow applications to retrieve data received on an output stream without blocking. This call can be called multiple times and freely intermixed with regular read calls with a guarantee that output will always be returned in order and without duplication. * Updated debug logging implementation to make it more maintainable, and to fix an issue where unprocessed packets were not logged in some cases. * Extended the support below for non-ASCII characters in comments to apply to X.509 certificates, allowing an optional encoding to be passed in to get_comment() and set_comment() and a get_comment_bytes() function to get the raw comment bytes without performing Unicode decoding. * Fixed an issue where a UnicodeDecodeError could be reported in some cases instead of a KeyEncryptionError when a private key was imported using the wrong passphrase. * Fixed the reporting of the MAC algorithm selected during key exchange to properly report the cipher name for GCM and Chacha ciphers that don't use a separate MAC algorithm. The correct value was being returned in queries after the key exchange was complete, but the logging was being done before this adjustment was made. * Fixed the documentation of connection_made() in SSHSession subclasses to properly reflect the type of SSHChannel objects passed to them. Downloads can be found in the usual place: Home page: http://asyncssh.readthedocs.io PyPI: https://pypi.python.org/pypi/asyncssh GitHub: https://github.com/ronf/asyncssh Please let me know if you have any questions or problems with this new release! -- Ron Frederick ronf@timeheart.net - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXA2sbWaOgq3Tt24GAQjcTA/9GgJ1Uzbg14XBVsGEgz5ivnSXhcn5bbRf xK+cplubnQRaY93GAttDGX8akEYGAYzmSiM9Nntj4rh+VUtMYiLyD+QVO9R/sOMt vTfOKhNJ9zz52RLgquEA7rju3KjbLcCDWw+reBuqE+Pf9G/j0mY/9HiJfpGfucz4 vmmmUaR1eN9lpXq4qSp3JuTevN5NuBYTUy49kEEbWmxBhzngMezGcOGh2Oc5BI+n 59j0/8OmW6o9P7jRyhLd9k+bgjAUcbMX6ANUr92h8jhDC2O+zOseH+yP85k+AM0y G+X7hsUQUUuT9s3TPA4VL4zwrACcwjIZmmxpL9/L/wfWd4Cw3198Xo/l/r7tlmio 2xTi2BQx82EvTwB1H9d2It7MACCV5d+N22iQHn7kK7pL7SkKosExskEE6LMurVX8 wQqRuN2n7YrQ8UjnaY98qfdwHNiXs16qJ2e+Isg3AfIwxdGw8QddwrDYQDoPAz+L 6XRSTApyMAYKRWS4rXmRQqMs/IMtQr6mxU0R7XdWj4sEaGUbcNgfJ7TgzCeVck16 4HiThXowhFelZ+4t8CT9vnVlwPlOwlMl9uK5xkVgiAX+C89AlRCoZjDBRYh5AZU7 iKmJ85SZw1a1s3oybIqGyj8yj0jvikT1Pf6zSkmTS9wGIjXRW5WqZXtUs9ojcFDR ciZEQBKl1kA= =Q6go -----END PGP SIGNATURE-----