[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-3872

Date: (C)2011-10-27   (M)2017-08-29
 
CVSS Score: 2.6Access Vector: NETWORK
Exploitability Subscore: 4.9Access Complexity: HIGH
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."

Reference:
SECUNIA-46550
SECUNIA-46578
SECUNIA-46934
SECUNIA-46964
BID-50356
USN-1238-1
USN-1238-2
http://groups.google.com/group/puppet-announce/browse_thread/thread/e7edc3a71348f3e1
http://puppetlabs.com/blog/important-security-announcement-altnames-vulnerability/
puppet-x509-spoofing(70970)

CPE    23
cpe:/a:puppetlabs:puppet:2.6.10
cpe:/a:puppetlabs:puppet_enterprise_users:1.2
cpe:/a:puppetlabs:puppet:2.6.2
cpe:/a:puppetlabs:puppet:2.7.1
...
CWE    1
CWE-20
OVAL    6
oval:org.secpod.oval:def:103708
oval:org.secpod.oval:def:103557
oval:org.secpod.oval:def:103698
oval:org.secpod.oval:def:600664
...

© 2013 SecPod Technologies