[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-3872Date: (C)2011-10-27   (M)2024-02-09


Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.6
Exploit Score: 4.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-46550
SECUNIA-46578
SECUNIA-46934
SECUNIA-46964
BID-50356
USN-1238-1
USN-1238-2
http://groups.google.com/group/puppet-announce/browse_thread/thread/e7edc3a71348f3e1
http://puppetlabs.com/blog/important-security-announcement-altnames-vulnerability/
https://puppet.com/security/cve/cve-2011-3872
puppet-x509-spoofing(70970)

CPE    2
cpe:/a:puppetlabs:puppet:2.7.1
cpe:/a:puppetlabs:puppet:2.7.0
CWE    1
CWE-20
OVAL    6
oval:org.secpod.oval:def:103557
oval:org.secpod.oval:def:600664
oval:org.secpod.oval:def:103566
oval:org.secpod.oval:def:103708
...

© SecPod Technologies