First published: Tue Nov 05 2013(Updated: )
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | =0.11.0 | |
SaltStack Salt | =0.12.0 | |
SaltStack Salt | =0.13.0 | |
SaltStack Salt | =0.14.0 | |
SaltStack Salt | =0.15.0 | |
SaltStack Salt | =0.15.1 | |
SaltStack Salt | =0.16.0 | |
SaltStack Salt | =0.16.2 | |
SaltStack Salt | =0.16.3 | |
SaltStack Salt | =0.16.4 | |
SaltStack Salt | =0.17.0 | |
pip/salt | >=0.11.0<0.17.1 | 0.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6617 is considered a moderate severity vulnerability due to improper privilege handling.
To fix CVE-2013-6617, upgrade to Salt version 0.17.1 or later.
CVE-2013-6617 affects Salt versions from 0.11.0 to 0.17.0.
CVE-2013-6617 can be exploited by remote attackers to gain elevated privileges on the affected system.
Yes, CVE-2013-6617 specifically affects SaltStack software versions listed in the vulnerability details.