SB2013110505 - Multiple vulnerabilities in SaltStack Salt



SB2013110505 - Multiple vulnerabilities in SaltStack Salt

Published: November 5, 2013 Updated: August 10, 2020

Security Bulletin ID SB2013110505
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-6617)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-4439)

The vulnerability allows a remote #AU# to read and manipulate data.

Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.


3) Improper Authentication (CVE-ID: CVE-2013-4435)

The vulnerability allows a remote #AU# to read and manipulate data.

Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.


4) Input validation error (CVE-ID: CVE-2013-4436)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.


5) Input validation error (CVE-ID: CVE-2013-4437)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."


Remediation

Install update from vendor's website.