[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-1054Date: (C)2012-05-29   (M)2024-02-09


Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3, when managing a user login file with the k5login resource type, allows local users to gain privileges via a symlink attack on .k5login.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.4
Exploit Score: 3.4
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-48157
SECUNIA-48161
SECUNIA-48166
SECUNIA-48290
BID-52158
OSVDB-79496
DSA-2419
SUSE-SU-2012:0325
USN-1372-1
http://projects.puppetlabs.com/issues/12460
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.14
http://puppetlabs.com/security/cve/cve-2012-1054/
openSUSE-SU-2012:0835
puppet-k5login-type-symlink(73446)

CPE    2
cpe:/a:puppetlabs:puppet:2.7.1
cpe:/a:puppetlabs:puppet:2.7.0
CWE    1
CWE-264
OVAL    11
oval:org.secpod.oval:def:1601258
oval:org.secpod.oval:def:700779
oval:org.secpod.oval:def:5916
oval:org.secpod.oval:def:6021
...

© SecPod Technologies