Lucene search

K
debianDebianDEBIAN:DSA-2715-1:48C93
HistoryJun 26, 2013 - 8:26 p.m.

[SECURITY] [DSA 2715-1] puppet security update

2013-06-2620:26:25
lists.debian.org
12

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.209 Low

EPSS

Percentile

96.4%


Debian Security Advisory DSA-2715-1 [email protected]
http://www.debian.org/security/ Raphael Geissert
June 26, 2013 http://www.debian.org/security/faq


Package : puppet
Vulnerability : code execution
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-3567

It was discovered that puppet, a centralized configuration management
system, did not correctly handle YAML payloads. A remote attacker could
use a specially-crafted payload to execute arbitrary code on the puppet
master.

For the oldstable distribution (squeeze), this problem will be fixed in
version 2.6.2-5+squeeze8.

For the stable distribution (wheezy), this problem has been fixed in
version 2.7.18-5.

For the testing distribution (jessie), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 3.2.2-1.

We recommend that you upgrade your puppet packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.209 Low

EPSS

Percentile

96.4%