CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
5.1%
It was discovered that Puppet incorrectly handled temporary files. A local
attacker could possibly use this issue to overwrite arbitrary files. In the
default installation of Ubuntu, this should be prevented by the Yama link
restrictions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.10 | noarch | puppet-common | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | puppet | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | puppet-el | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | puppet-testsuite | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | puppetmaster | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | puppetmaster-common | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | puppetmaster-passenger | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.10 | noarch | vim-puppet | < 3.2.4-2ubuntu2.2 | UNKNOWN |
Ubuntu | 13.04 | noarch | puppet-common | < 2.7.18-4ubuntu1.3 | UNKNOWN |
Ubuntu | 13.04 | noarch | puppet | < 2.7.18-4ubuntu1.3 | UNKNOWN |