ESB-2017.2371 - [Win][UNIX/Linux][Debian] pyjwt: Provide misleading information - Remote/unauthenticated 2017-09-20

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2371
                           pyjwt security update
                             20 September 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pyjwt
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Debian GNU/Linux 9
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-11424  

Reference:         ESB-2017.2175

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3979

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3979-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 19, 2017                    https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : pyjwt
CVE ID         : CVE-2017-11424

It was discovered that PyJWT, a Python implementation of JSON Web Token
performed insufficient validation of some public key types, which could
allow a remote attacker to craft JWTs from scratch.

For the oldstable distribution (jessie), this problem has been fixed
in version 0.2.1-1+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1.4.2-1+deb9u1.

We recommend that you upgrade your pyjwt packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=skUp
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWcGyCox+lLeg9Ub1AQhGxg//VvDJ1T7NRKPjVLAsnwEY652SSbjMUrhd
WVl8hBlDD8qEE1eYS/Z5sT7RVDKNOLlrRJAtIqKovRrD0QDQQYsH03yG931h0f23
a/OoELgQ5yZy5iCUaC2hH1rQylJR5Ebt46ju/DAMfZ5xmtvnzylsHIYFpJLwKe2S
rVBxH9hIzUgGxxvBsBL9gohKtxyRVsU7CiWibaGP+VEMaGYux7RiU1ke0b49zjup
R3x1euZBGtxxbRtKdn9YggQF93Br7mL/lXAe2ITWWBiIyqFw9LyXMqHFzD7El4mq
Z5qZv0WCT2SsZuvSb/t2Xfi4eTg12lrVm6bnQEZYFIv2YkaNtIIlJDp3SVu67i95
dRawvzBMN2Ne43sOHa+gxfeboSjkdXurTxtJtkrvKx4Dgf5YJaY06GLTaT6aLuI6
L+DGs6nthv90YjYM84rXF7livFlJJVrdN07IZBSrPKD8LgsR3+mChF5/r+nRFTjK
mkg9mT2o+vTTvWibuL5hFkCFGf0eyP9VYAM+wsG9EqLeTrBbO3uoJzC86+aqXY9K
xIV4EIDdzMSLRQutVQb8C9vs8Pnd8/WnCp+I2EF3QTM+fGK2eeR95OuwyNiqgXDi
nlP8hU99E16O14rv89afoxwmSmHsU2LpJ7zxF7u4OFAznxn/r3WYmlY6oSjdPQ4z
ur+AymGdIb8=
=kAOO
-----END PGP SIGNATURE-----

« Back to bulletins