SB2011102703 - Multiple vulnerabilities in Puppet
Published: October 27, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Link following (CVE-ID: CVE-2011-3869)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
2) Link following (CVE-ID: CVE-2011-3870)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-3871)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
Remediation
Install update from vendor's website.
References
- http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html
- http://secunia.com/advisories/46458
- http://www.debian.org/security/2011/dsa-2314
- http://www.ubuntu.com/usn/USN-1223-1
- http://www.ubuntu.com/usn/USN-1223-2
- https://puppet.com/security/cve/cve-2011-3869
- https://puppet.com/security/cve/cve-2011-3870
- https://puppet.com/security/cve/cve-2011-3871