CVE-2023-46445: AsyncSSH Rogue Extension Negotiation
(updated )
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack.
References
- github.com/advisories/GHSA-cfc2-wr2v-gxm5
- github.com/pypa/advisory-database/tree/main/vulns/asyncssh/PYSEC-2023-237.yaml
- github.com/ronf/asyncssh
- github.com/ronf/asyncssh/blob/develop/docs/changes.rst
- github.com/ronf/asyncssh/commit/83e43f5ea3470a8617fc388c72b062c7136efd7e
- github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5
- lists.debian.org/debian-lts-announce/2024/09/msg00042.html
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ME34ROZWMDK5KLMZKTSA422XVJZ7IMTE
- nvd.nist.gov/vuln/detail/CVE-2023-46445
- security.netapp.com/advisory/ntap-20231222-0001
- www.terrapin-attack.com/
Code Behaviors & Features
Detect and mitigate CVE-2023-46445 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →