First published: Wed Jul 11 2012(Updated: )
From puppet labs: <a href="https://access.redhat.com/security/cve/CVE-2012-3867">CVE-2012-3867</a> (Insufficient input validation) A bug in Puppet 2.6.16 and 2.7.17 uses insufficient input validation for agent certificate names. An attacker can trick the administrator into signing an attacker’s certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker’s certificate, the attacker can then man-in-the-middle the deployment’s agent nodes. Resolved in Puppet 2.6.17, 2.7.18
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/puppet | <2.6.17 | 2.6.17 |
redhat/puppet | <2.7.18 | 2.7.18 |
Puppet Puppet | =2.6.0 | |
Puppet Puppet | =2.6.1 | |
Puppet Puppet | =2.6.2 | |
Puppet Puppet | =2.6.3 | |
Puppet Puppet | =2.6.4 | |
Puppet Puppet | =2.6.5 | |
Puppet Puppet | =2.6.6 | |
Puppet Puppet | =2.6.7 | |
Puppet Puppet | =2.6.8 | |
Puppet Puppet | =2.6.9 | |
Puppet Puppet | =2.6.10 | |
Puppet Puppet | =2.6.11 | |
Puppet Puppet | =2.6.12 | |
Puppet Puppet | =2.6.13 | |
Puppet Puppet | =2.6.14 | |
Puppet Puppet | =2.6.15 | |
Puppet Puppet | =2.7.2 | |
Puppet Puppet | =2.7.3 | |
Puppet Puppet | =2.7.4 | |
Puppet Puppet | =2.7.5 | |
Puppet Puppet | =2.7.6 | |
Puppet Puppet | =2.7.7 | |
Puppet Puppet | =2.7.8 | |
Puppet Puppet | =2.7.9 | |
Puppet Puppet | =2.7.10 | |
Puppet Puppet | =2.7.11 | |
Puppet Puppet | =2.7.12 | |
Puppet Puppet | =2.7.13 | |
Puppet Puppet | =2.7.14 | |
Puppet Puppet | =2.7.16 | |
Puppet Puppet | =2.7.17 | |
Puppetlabs Puppet | <=2.6.16 | |
Puppetlabs Puppet | =2.7.0 | |
Puppetlabs Puppet | =2.7.1 | |
Debian Debian Linux | =6.0 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =11.04 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =12.04 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.1 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Suse Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
Puppet Puppet Enterprise | <=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.