First published: Wed Jul 11 2012(Updated: )
From puppet labs: <a href="https://access.redhat.com/security/cve/CVE-2012-3867">CVE-2012-3867</a> (Insufficient input validation) A bug in Puppet 2.6.16 and 2.7.17 uses insufficient input validation for agent certificate names. An attacker can trick the administrator into signing an attacker’s certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker’s certificate, the attacker can then man-in-the-middle the deployment’s agent nodes. Resolved in Puppet 2.6.17, 2.7.18
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/puppet | <2.6.17 | 2.6.17 |
redhat/puppet | <2.7.18 | 2.7.18 |
Puppet by Puppet Labs | =2.6.0 | |
Puppet by Puppet Labs | =2.6.1 | |
Puppet by Puppet Labs | =2.6.2 | |
Puppet by Puppet Labs | =2.6.3 | |
Puppet by Puppet Labs | =2.6.4 | |
Puppet by Puppet Labs | =2.6.5 | |
Puppet by Puppet Labs | =2.6.6 | |
Puppet by Puppet Labs | =2.6.7 | |
Puppet by Puppet Labs | =2.6.8 | |
Puppet by Puppet Labs | =2.6.9 | |
Puppet by Puppet Labs | =2.6.10 | |
Puppet by Puppet Labs | =2.6.11 | |
Puppet by Puppet Labs | =2.6.12 | |
Puppet by Puppet Labs | =2.6.13 | |
Puppet by Puppet Labs | =2.6.14 | |
Puppet by Puppet Labs | =2.6.15 | |
Puppet by Puppet Labs | =2.7.2 | |
Puppet by Puppet Labs | =2.7.3 | |
Puppet by Puppet Labs | =2.7.4 | |
Puppet by Puppet Labs | =2.7.5 | |
Puppet by Puppet Labs | =2.7.6 | |
Puppet by Puppet Labs | =2.7.7 | |
Puppet by Puppet Labs | =2.7.8 | |
Puppet by Puppet Labs | =2.7.9 | |
Puppet by Puppet Labs | =2.7.10 | |
Puppet by Puppet Labs | =2.7.11 | |
Puppet by Puppet Labs | =2.7.12 | |
Puppet by Puppet Labs | =2.7.13 | |
Puppet by Puppet Labs | =2.7.14 | |
Puppet by Puppet Labs | =2.7.16 | |
Puppet by Puppet Labs | =2.7.17 | |
Puppet by Puppet Labs | <=2.6.16 | |
Puppet by Puppet Labs | =2.7.0 | |
Puppet by Puppet Labs | =2.7.1 | |
Debian GNU/Linux | =6.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp1 | |
suse linux enterprise server vmware | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
Puppetlabs Puppet Enterprise | <=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3867 has a moderate level of severity due to insufficient input validation in Puppet.
To fix CVE-2012-3867, upgrade Puppet to version 2.6.17 or 2.7.18 or later.
CVE-2012-3867 affects Puppet versions 2.6.16 and 2.7.17 and earlier.
CVE-2012-3867 is classified as an insufficient input validation vulnerability.
Yes, an attacker with local access could exploit CVE-2012-3867 by tricking an administrator into signing a malicious certificate.