Arch Linux 752 Published by

The following updates has been released for Arch Linux:

ASA-201810-10: libssh: authentication bypass
ASA-201810-11: net-snmp: multiple issues



ASA-201810-10: libssh: authentication bypass


Arch Linux Security Advisory ASA-201810-10
==========================================

Severity: Critical
Date : 2018-10-17
CVE-ID : CVE-2018-10933
Package : libssh
Type : authentication bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-780

Summary
=======

The package libssh before version 0.8.4-1 is vulnerable to
authentication bypass.

Resolution
==========

Upgrade to 0.8.4-1.

# pacman -Syu "libssh>=0.8.4-1"

The problem has been fixed upstream in version 0.8.4.

Workaround
==========

None.

Description
===========

An authentication bypass vulnerability has been discovered in libssh
versions prior to 0.7.6 and 0.8.4, in the server-side state machine. By
presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of
the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to
initiate authentication, the attacker could successfully authenticate
without any credentials, resulting in unauthorized access.

Impact
======

A remote attacker is able to successfully authenticate without any
credentials, resulting in unauthorized access.

References
==========

https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/
https://www.libssh.org/security/advisories/CVE-2018-10933.txt
https://git.libssh.org/projects/libssh.git/commit/?id=2bddafeb709eacc80ad31fec40479f9b628a8bd7
https://git.libssh.org/projects/libssh.git/commit/?id=825f4ba96407abe8cebb046a7503fa2bf5de9df6
https://git.libssh.org/projects/libssh.git/commit/?id=20981bf2296202e95d7919394d4610ae3a876cfa
https://git.libssh.org/projects/libssh.git/commit/?id=5d7414467d6dac100a93df761b06de5cd07fc69a
https://git.libssh.org/projects/libssh.git/commit/?id=459868c4a57d2d11cf7835655a8d1a5cf034ccb4
https://git.libssh.org/projects/libssh.git/commit/?id=68b0c7a93448123cc0d6a04d3df40d92a3fd0a67
https://git.libssh.org/projects/libssh.git/commit/?id=75be012b4a14f4550ce6ad3f126e559f44dbde76
https://git.libssh.org/projects/libssh.git/commit/?id=e1548a71bdac73da084174ab1d6d2713edd93f6e
https://security.archlinux.org/CVE-2018-10933

ASA-201810-11: net-snmp: multiple issues


Arch Linux Security Advisory ASA-201810-11
==========================================

Severity: High
Date : 2018-10-17
CVE-ID : CVE-2015-5621 CVE-2018-18065
Package : net-snmp
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-777

Summary
=======

The package net-snmp before version 5.8-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.

Resolution
==========

Upgrade to 5.8-1.

# pacman -Syu "net-snmp>=5.8-1"

The problems have been fixed upstream in version 5.8.

Workaround
==========

None.

Description
===========

- CVE-2015-5621 (arbitrary code execution)

It was discovered that in net-snmp before 5.8 the snmp_pdu_parse()
function could leave incompletely parsed varBind variables in the list
of variables. A remote, unauthenticated attacker could use this flaw to
crash snmpd or potentially execute arbitrary code on the system with
the privileges of the user running snmpd.

- CVE-2018-18065 (denial of service)

A denial of service vulnerability has been discovered in net-snmp
before 5.8. The _set_key function in agent/helpers/table_container.c
has a NULL pointer exception bug that can be used by an authenticated
attacker to remotely cause the instance to crash via a crafted UDP
packet, resulting in denial of service.

Impact
======

A remote unauthenticated attacker is able to crash snmpd or potentially
execute arbitrary code on the system by sending specially crafted
packets.

References
==========

https://seclists.org/oss-sec/2018/q4/24
https://sourceforge.net/p/net-snmp/bugs/2615/
https://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791
https://www.openwall.com/lists/oss-security/2015/04/13/1
https://bugzilla.redhat.com/show_bug.cgi?id=1212408
https://sourceforge.net/p/net-snmp/bugs/2743/
https://sourceforge.net/p/net-snmp/code/ci/7ffb8e25a0db851953155de91f0170e9bf8c457d
https://dumpco.re/blog/net-snmp-5.7.3-remote-dos
https://security.archlinux.org/CVE-2015-5621
https://security.archlinux.org/CVE-2018-18065