2.19.0
10 years ago
14 days ago
Known vulnerabilities in the asyncssh package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Authentication Bypass by Capture-replay during the establishment of the secure channel. An attacker can manipulate handshake sequence numbers to delete messages sent immediately after the channel is established. Note:
Impact: While cryptographically novel, there is no discernable impact on the integrity of SSH traffic beyond giving the attacker the ability to delete the message that enables some features related to keystroke timing obfuscation. To successfully carry out the exploitation, the connection needs to be protected using either the How to fix Authentication Bypass by Capture-replay? Upgrade | [,2.14.2) |
Affected versions of this package are vulnerable to Exposure of Private Personal Information to an Unauthorized Actor during the How to fix Exposure of Private Personal Information to an Unauthorized Actor? Upgrade | [,2.14.1) |
Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value. An attacker can exploit an implementation flaw in the AsyncSSH implementation to inject an extension info message chosen by the attacker and delete the original extension info message, effectively replacing it. Note:
AsyncSSH supports the How to fix Improper Validation of Integrity Check Value? Upgrade | [,2.14.1) |
Affected versions of this package are vulnerable to Denial of Service (DoS). It does not limit line length when the editor is in use. How to fix Denial of Service (DoS)? Upgrade | [,2.5.0) |
asyncssh is a Python package which provides an asynchronous client and server implementation of the SSHv2 protocol on top of the Python 3.4+ asyncio framework. Affected versions of this package are vulnerable to Authentication Bypass. It does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step. How to fix Authentication Bypass? Upgrade | [,1.12.1) |