Puppet misgenerates certificates leading to man in the middle attack
Reporter | Title | Published | Views | Family All 52 |
---|---|---|---|---|
NVD | CVE-2011-3872 | 27 Oct 201120:55 | – | nvd |
Tenable Nessus | Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : puppet vulnerability (USN-1238-1) | 25 Oct 201100:00 | – | nessus |
Tenable Nessus | Fedora 16 : puppet-2.6.12-1.fc16 (2011-14880) | 22 Nov 201100:00 | – | nessus |
Tenable Nessus | Fedora 15 : puppet-2.6.12-1.fc15 (2011-14994) | 22 Nov 201100:00 | – | nessus |
Tenable Nessus | Debian DSA-2352-1 : puppet - programming error | 23 Nov 201100:00 | – | nessus |
Tenable Nessus | Fedora 14 : puppet-2.6.12-1.fc14 (2011-15000) | 22 Nov 201100:00 | – | nessus |
Tenable Nessus | SuSE 11.1 Security Update : puppet (SAT Patch Number 5421) | 13 Dec 201100:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : puppet (openSUSE-SU-2011:1288-1) | 13 Jun 201400:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : puppet (openSUSE-SU-2011:1288-1) | 13 Jun 201400:00 | – | nessus |
Tenable Nessus | GLSA-201203-03 : Puppet: Multiple vulnerabilities | 6 Mar 201200:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 5 | all | puppet | 0.24.5-3+lenny2 | puppet_0.24.5-3+lenny2_all.deb |
Debian | 6 | all | puppet-testsuite | 2.6.2-5+squeeze3 | puppet-testsuite_2.6.2-5+squeeze3_all.deb |
Debian | 6 | all | puppet-el | 2.6.2-5+squeeze3 | puppet-el_2.6.2-5+squeeze3_all.deb |
Debian | 6 | all | puppetmaster | 2.6.2-5+squeeze3 | puppetmaster_2.6.2-5+squeeze3_all.deb |
Debian | 6 | all | puppet | 2.6.2-5+squeeze3 | puppet_2.6.2-5+squeeze3_all.deb |
Debian | 6 | all | vim-puppet | 2.6.2-5+squeeze3 | vim-puppet_2.6.2-5+squeeze3_all.deb |
Debian | 6 | all | puppet-common | 2.6.2-5+squeeze3 | puppet-common_2.6.2-5+squeeze3_all.deb |
Debian | 5 | all | puppetmaster | 0.24.5-3+lenny2 | puppetmaster_0.24.5-3+lenny2_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo