#VU38511 Format string error in Puppet Enterprise


Published: 2017-08-09 | Updated: 2020-08-08

Vulnerability identifier: #VU38511

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-5716

CWE-ID: CWE-134

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Puppet Enterprise
Client/Desktop applications / Software for system administration

Vendor: Puppet Labs

Description

The vulnerability allows a remote authenticated user to execute arbitrary code.

The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Puppet Enterprise: 2015.2.0 - 2015.3.3, 2016.1.1 - 2016.2.1


External links
http://puppet.com/security/cve/pe-console-oct-2016


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability