mirror of
				https://github.com/jtesta/ssh-audit.git
				synced 2025-10-31 09:31:01 +01:00 
			
		
		
		
	Gracefully handle rare exceptions (i.e.: crashes) while performing GEX tests.
This commit is contained in:
		| @@ -185,6 +185,7 @@ For convenience, a web front-end on top of the command-line tool is available at | |||||||
|  - Fixed parsing of ecdsa-sha2-nistp* CA signatures on host keys.  Additionally, they are now flagged as potentially back-doored, just as standard host keys are. |  - Fixed parsing of ecdsa-sha2-nistp* CA signatures on host keys.  Additionally, they are now flagged as potentially back-doored, just as standard host keys are. | ||||||
|  - The built-in man page (`-m`, `--manual`) is now available on Docker, PyPI, and Snap builds, in addition to the Windows build. |  - The built-in man page (`-m`, `--manual`) is now available on Docker, PyPI, and Snap builds, in addition to the Windows build. | ||||||
|  - Snap builds are now architecture-independent. |  - Snap builds are now architecture-independent. | ||||||
|  |  - Gracefully handle rare exceptions (i.e.: crashes) while performing GEX tests. | ||||||
|  |  | ||||||
| ### v3.1.0 (2023-12-20) | ### v3.1.0 (2023-12-20) | ||||||
|  - Added test for the Terrapin message prefix truncation vulnerability ([CVE-2023-48795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795)). |  - Added test for the Terrapin message prefix truncation vulnerability ([CVE-2023-48795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795)). | ||||||
|   | |||||||
| @@ -21,6 +21,7 @@ | |||||||
|    OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN |    OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||||||
|    THE SOFTWARE. |    THE SOFTWARE. | ||||||
| """ | """ | ||||||
|  | import struct | ||||||
| import traceback | import traceback | ||||||
|  |  | ||||||
| # pylint: disable=unused-import | # pylint: disable=unused-import | ||||||
| @@ -65,7 +66,7 @@ class GEXTest: | |||||||
|             # Parse the server's KEX. |             # Parse the server's KEX. | ||||||
|             _, payload = s.read_packet(2) |             _, payload = s.read_packet(2) | ||||||
|             SSH2_Kex.parse(out, payload) |             SSH2_Kex.parse(out, payload) | ||||||
|         except KexDHException: |         except (KexDHException, struct.error): | ||||||
|             out.v("Failed to parse server's kex.  Stack trace:\n%s" % str(traceback.format_exc()), write_now=True) |             out.v("Failed to parse server's kex.  Stack trace:\n%s" % str(traceback.format_exc()), write_now=True) | ||||||
|             return False |             return False | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Joe Testa
					Joe Testa