Lucene search

K
amazonAmazonALAS-2013-219
HistorySep 04, 2013 - 1:30 p.m.

Medium: puppet

2013-09-0413:30:00
alas.aws.amazon.com
9

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

83.9%

Issue Overview:

Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified “local file system access” to the Puppet Master.

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.

Affected Packages:

puppet

Issue Correction:
Run yum update puppet to update your system.

New Packages:

i686:  
    puppet-debuginfo-2.7.23-1.0.amzn1.i686  
    puppet-2.7.23-1.0.amzn1.i686  
    puppet-server-2.7.23-1.0.amzn1.i686  
  
src:  
    puppet-2.7.23-1.0.amzn1.src  
  
x86_64:  
    puppet-debuginfo-2.7.23-1.0.amzn1.x86_64  
    puppet-2.7.23-1.0.amzn1.x86_64  
    puppet-server-2.7.23-1.0.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-4761, CVE-2013-4956

Mitre: CVE-2013-4761, CVE-2013-4956

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

83.9%