First published: Tue Jan 07 2014(Updated: )
Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet | >=3.0.0<=3.3.2 | |
Puppet | >=3.4.0<3.4.1 | |
Puppet Enterprise | >=2.0.0<2.8.4 | |
Puppet Enterprise | >=3.1<3.1.1 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4969 has a moderate severity due to the potential for local users to exploit symlink attacks.
To fix CVE-2013-4969, upgrade Puppet to version 3.3.3 or later, or 3.4.1 or later for 3.4.x versions.
Puppet versions before 3.3.3, 3.4 before 3.4.1, Puppet Enterprise before 2.8.4, and 3.1 before 3.1.1 are affected by CVE-2013-4969.
No, CVE-2013-4969 is a local vulnerability allowing exploitation by local users only.
CVE-2013-4969 impacts systems running affected versions of Puppet or Puppet Enterprise on various Linux distributions.