SB2013101701 - Fedora EPEL 6 update for salt
Published: October 17, 2013 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Improper Authentication (CVE-ID: CVE-2013-4435)
The vulnerability allows a remote #AU# to read and manipulate data.
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
2) Input validation error (CVE-ID: CVE-2013-4436)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
3) Input validation error (CVE-ID: CVE-2013-4437)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
4) Code Injection (CVE-ID: CVE-2013-4438)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-4439)
The vulnerability allows a remote #AU# to read and manipulate data.
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-6617)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.
Remediation
Install update from vendor's website.