CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:C/A:C
EPSS
Percentile
5.1%
Issue Overview:
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
Affected Packages:
puppet
Issue Correction:
Run yum update puppet to update your system.
New Packages:
i686:
puppet-2.6.6-3.2.amzn1.i686
puppet-server-2.6.6-3.2.amzn1.i686
puppet-debuginfo-2.6.6-3.2.amzn1.i686
src:
puppet-2.6.6-3.2.amzn1.src
x86_64:
puppet-debuginfo-2.6.6-3.2.amzn1.x86_64
puppet-2.6.6-3.2.amzn1.x86_64
puppet-server-2.6.6-3.2.amzn1.x86_64
Red Hat: CVE-2011-3869, CVE-2011-3870, CVE-2011-3871
Mitre: CVE-2011-3869, CVE-2011-3870, CVE-2011-3871
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | puppet | < 2.6.6-3.2.amzn1 | puppet-2.6.6-3.2.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | puppet-server | < 2.6.6-3.2.amzn1 | puppet-server-2.6.6-3.2.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | puppet-debuginfo | < 2.6.6-3.2.amzn1 | puppet-debuginfo-2.6.6-3.2.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | puppet-debuginfo | < 2.6.6-3.2.amzn1 | puppet-debuginfo-2.6.6-3.2.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | puppet | < 2.6.6-3.2.amzn1 | puppet-2.6.6-3.2.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | puppet-server | < 2.6.6-3.2.amzn1 | puppet-server-2.6.6-3.2.amzn1.x86_64.rpm |