[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2451-1 puppet -- several

ID: oval:org.secpod.oval:def:600777Date: (C)2012-04-19   (M)2024-02-08
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in puppet, a centralized configuration management system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2012-1906 Puppet is using predictable temporary file names when downloading Mac OS X package files. This allows a local attacker to either overwrite arbitrary files on the system or to install an arbitrary package. CVE-2012-1986 When handling requests for a file from a remote filebucket, puppet can be tricked into overwriting its defined location for filebucket storage. This allows an authorized attacker with access to the puppet master to read arbitrary files. CVE-2012-1987 Puppet is incorrectly handling filebucket store requests. This allows an attacker to perform denial of service attacks against puppet by resource exhaustion. CVE-2012-1988 Puppet is incorrectly handling filebucket requests. This allows an attacker with access to the certificate on the agent and an unprivileged account on puppet master to execute arbitrary code via crafted file path names and making a filebucket request.

Platform:
Debian 6.0
Product:
puppet
Reference:
DSA-2451-1
CVE-2012-1906
CVE-2012-1986
CVE-2012-1987
CVE-2012-1988
CVE    4
CVE-2012-1906
CVE-2012-1986
CVE-2012-1987
CVE-2012-1988
...
CPE    29
cpe:/a:puppetlabs:puppet:2.6.10
cpe:/o:debian:debian_linux:6.0
cpe:/a:puppetlabs:puppet:2.7.10
cpe:/a:puppetlabs:puppet:2.7.11
...

© SecPod Technologies