SB2017013113 - Arch Linux update for salt



SB2017013113 - Arch Linux update for salt

Published: January 31, 2017 Updated: May 3, 2017

Security Bulletin ID SB2017013113
CSH Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2017-5192)

The vulnerability allows a remote authenticated user to execute arbitrary code.

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.


2) Command injection (CVE-ID: CVE-2017-5200)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The weakness exists in a salt-master due to command injection via Salt's ssh_client. A remote attacker can inject and execute arbitrary commands.

Remediation

Install update from vendor's website.