First published: Thu Oct 27 2011(Updated: )
Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet | =2.7.0 | |
Puppet | =2.7.1 | |
Puppet | =2.6.0 | |
Puppet | =2.6.1 | |
Puppet | =2.6.2 | |
Puppet | =2.6.3 | |
Puppet | =2.6.4 | |
Puppet | =2.6.5 | |
Puppet | =2.6.6 | |
Puppet | =2.6.7 | |
Puppet | =2.6.8 | |
Puppet | =2.6.9 | |
Puppet | =2.6.10 | |
Puppet | =2.6.11 | |
Puppet | =2.7.2 | |
Puppet | =2.7.3 | |
Puppet | =2.7.4 | |
Puppet | =2.7.5 | |
Puppetlabs Puppet Enterprise | =1.0 | |
Puppetlabs Puppet Enterprise | =1.1 | |
Puppet Enterprise | =1.2.0 | |
Puppet Enterprise | =1.2.1 | |
Puppet Enterprise | =1.2.2 | |
Puppet Enterprise | =1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-3872 is considered to be moderate due to potential certificate spoofing vulnerabilities.
To fix CVE-2011-3872, upgrade Puppet to version 2.6.12 or 2.7.6 or later, or Puppet Enterprise to version 1.2.4 or later.
CVE-2011-3872 affects Puppet versions 2.6.x before 2.6.12 and 2.7.x before 2.7.6.
Yes, CVE-2011-3872 affects Puppet Enterprise Users versions 1.0, 1.1, and 1.2 prior to 1.2.4.
CVE-2011-3872 allows remote attackers to spoof a Puppet master's certificate via manipulating X.509 Subject Alternative Name fields.