[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-3872

Date: (C)2011-10-27   (M)2017-12-13 


Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."

CVSS Score: 2.6Access Vector: NETWORK
Exploit Score: 4.9Access Complexity: HIGH
Impact Score: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE





Reference:
SECUNIA-46550
SECUNIA-46578
SECUNIA-46934
SECUNIA-46964
BID-50356
USN-1238-1
USN-1238-2
http://groups.google.com/group/puppet-announce/browse_thread/thread/e7edc3a71348f3e1
http://puppetlabs.com/blog/important-security-announcement-altnames-vulnerability/
https://puppet.com/security/cve/cve-2011-3872
puppet-x509-spoofing(70970)

CPE    23
cpe:/a:puppetlabs:puppet:2.6.10
cpe:/a:puppetlabs:puppet_enterprise_users:1.2
cpe:/a:puppetlabs:puppet:2.6.2
cpe:/a:puppetlabs:puppet:2.7.1
...
CWE    1
CWE-20
OVAL    6
oval:org.secpod.oval:def:103708
oval:org.secpod.oval:def:103557
oval:org.secpod.oval:def:103698
oval:org.secpod.oval:def:600664
...

© 2013 SecPod Technologies