Puppet versions 2.6.x through 2.7.6 and Puppet Enterprise (PE) versions 1.0 through 1.2.4 allow remote attackers to spoof a Puppet master via a man-in-the-middle attack by manipulating X.509 certificates
Reporter | Title | Published | Views | Family All 52 |
---|---|---|---|---|
![]() | CVE-2011-3872 | 27 Oct 201120:00 | – | cvelist |
![]() | [SECURITY] Fedora 16 Update: puppet-2.6.12-1.fc16 | 19 Nov 201105:58 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: puppet-2.6.14-1.fc16 | 10 Mar 201221:52 | – | fedora |
![]() | [SECURITY] Fedora 14 Update: puppet-2.6.12-1.fc14 | 19 Nov 201106:08 | – | fedora |
![]() | [SECURITY] Fedora 15 Update: puppet-2.6.12-1.fc15 | 19 Nov 201106:01 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: puppet-2.6.16-1.fc16 | 27 Apr 201205:51 | – | fedora |
![]() | [SECURITY] Fedora 15 Update: puppet-2.6.14-1.fc15 | 10 Mar 201221:53 | – | fedora |
![]() | [SECURITY] Fedora 15 Update: puppet-2.6.16-1.fc15 | 27 Apr 201206:05 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: puppet-2.6.17-2.fc16 | 28 Jul 201201:17 | – | fedora |
![]() | Fedora 16 : puppet-2.6.12-1.fc16 (2011-14880) | 22 Nov 201100:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo