2.19.0
10 years ago
14 days ago
Known vulnerabilities in the asyncssh package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Authentication Bypass by Capture-replay during the establishment of the secure channel. An attacker can manipulate handshake sequence numbers to delete messages sent immediately after the channel is established. Note:
Impact: While cryptographically novel, there is no discernable impact on the integrity of SSH traffic beyond giving the attacker the ability to delete the message that enables some features related to keystroke timing obfuscation. To successfully carry out the exploitation, the connection needs to be protected using either the How to fix Authentication Bypass by Capture-replay? Upgrade | [,2.14.2) |
Affected versions of this package are vulnerable to Exposure of Private Personal Information to an Unauthorized Actor during the How to fix Exposure of Private Personal Information to an Unauthorized Actor? Upgrade | [,2.14.1) |
Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value. An attacker can exploit an implementation flaw in the AsyncSSH implementation to inject an extension info message chosen by the attacker and delete the original extension info message, effectively replacing it. Note:
AsyncSSH supports the How to fix Improper Validation of Integrity Check Value? Upgrade | [,2.14.1) |