Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-3248
HistoryNov 16, 2014 - 12:00 a.m.

CVE-2014-3248

2014-11-1600:00:00
ubuntu.com
ubuntu.com
12

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before
2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with
Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan
horse file in the current working directory, as demonstrated using (1)
rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so,
(4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7)
operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10)
osfamily.so in puppet/confine.

OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchfacter< anyUNKNOWN
ubuntu14.04noarchpuppet< 3.4.3-1ubuntu1.2UNKNOWN

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%