CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
5.1%
USN-1223-1 fixed vulnerabilities in Puppet. A regression was found on
Ubuntu 10.04 LTS that caused permission denied errors when managing SSH
authorized_keys files with Puppet. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Puppet unsafely opened files when the k5login type
is used to manage files. A local attacker could exploit this to overwrite
arbitrary files which could be used to escalate privileges. (CVE-2011-3869)
Ricky Zhou discovered that Puppet did not drop privileges when creating
SSH authorized_keys files. A local attacker could exploit this to overwrite
arbitrary files as root. (CVE-2011-3870)
It was discovered that Puppet used a predictable filename when using the
--edit resource. A local attacker could exploit this to edit arbitrary
files or run arbitrary code as the user invoking the program, typically
root. (CVE-2011-3871)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 10.04 | noarch | puppet-common | < 0.25.4-2ubuntu6.4 | UNKNOWN |
Ubuntu | 10.04 | noarch | puppet | < 0.25.4-2ubuntu6.4 | UNKNOWN |
Ubuntu | 10.04 | noarch | puppet-el | < 0.25.4-2ubuntu6.4 | UNKNOWN |
Ubuntu | 10.04 | noarch | puppet-testsuite | < 0.25.4-2ubuntu6.4 | UNKNOWN |
Ubuntu | 10.04 | noarch | puppetmaster | < 0.25.4-2ubuntu6.4 | UNKNOWN |
Ubuntu | 10.04 | noarch | vim-puppet | < 0.25.4-2ubuntu6.4 | UNKNOWN |