SB2013101701 - Fedora EPEL 6 update for salt



SB2013101701 - Fedora EPEL 6 update for salt

Published: October 17, 2013 Updated: April 24, 2025

Security Bulletin ID SB2013101701
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 17% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2013-4435)

The vulnerability allows a remote #AU# to read and manipulate data.

Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.


2) Input validation error (CVE-ID: CVE-2013-4436)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.


3) Input validation error (CVE-ID: CVE-2013-4437)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."


4) Code Injection (CVE-ID: CVE-2013-4438)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-4439)

The vulnerability allows a remote #AU# to read and manipulate data.

Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-6617)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.


Remediation

Install update from vendor's website.