CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
5.1%
It was discovered that Puppet unsafely opened files when the k5login type
is used to manage files. A local attacker could exploit this to overwrite
arbitrary files which could be used to escalate privileges. (CVE-2011-3869)
Ricky Zhou discovered that Puppet did not drop privileges when creating
SSH authorized_keys files. A local attacker could exploit this to overwrite
arbitrary files as root. (CVE-2011-3870)
It was discovered that Puppet used a predictable filename when using the
--edit resource. A local attacker could exploit this to edit arbitrary
files or run arbitrary code as the user invoking the program, typically
root. (CVE-2011-3871)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 11.04 | noarch | puppet-common | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | puppet | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | puppet-el | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | puppet-testsuite | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | puppetmaster | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | puppetmaster-common | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | puppetmaster-passenger | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | vim-puppet | < 2.6.4-2ubuntu2.3 | UNKNOWN |
Ubuntu | 10.10 | noarch | puppet-common | < 2.6.1-0ubuntu2.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | puppet | < 2.6.1-0ubuntu2.2 | UNKNOWN |