Lucene search

K
amazonAmazonALAS-2011-011
HistoryOct 31, 2011 - 6:22 p.m.

Medium: puppet

2011-10-3118:22:00
alas.aws.amazon.com
18

CVSS2

6.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:C/A:C

EPSS

0

Percentile

5.1%

Issue Overview:

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.

Affected Packages:

puppet

Issue Correction:
Run yum update puppet to update your system.

New Packages:

i686:  
    puppet-2.6.6-3.2.amzn1.i686  
    puppet-server-2.6.6-3.2.amzn1.i686  
    puppet-debuginfo-2.6.6-3.2.amzn1.i686  
  
src:  
    puppet-2.6.6-3.2.amzn1.src  
  
x86_64:  
    puppet-debuginfo-2.6.6-3.2.amzn1.x86_64  
    puppet-2.6.6-3.2.amzn1.x86_64  
    puppet-server-2.6.6-3.2.amzn1.x86_64  

Additional References

Red Hat: CVE-2011-3869, CVE-2011-3870, CVE-2011-3871

Mitre: CVE-2011-3869, CVE-2011-3870, CVE-2011-3871

CVSS2

6.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:C/A:C

EPSS

0

Percentile

5.1%