First published: Sun Nov 16 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/facter | 3.14.12-1 4.3.0-2 4.8.0-1 | |
debian/hiera | 3.2.0-2.1 3.10.0-1 3.12.0-1 | |
debian/mcollective | 2.12.5+dfsg-1 2.12.5+dfsg-1.1 | |
debian/puppet | 5.5.22-2 | |
Puppetlabs Facter | =2.0.0-rc1 | |
Puppetlabs Facter | =2.0.0-rc2 | |
Puppetlabs Facter | =2.0.0-rc3 | |
Puppetlabs Facter | =2.0.0-rc4 | |
Puppetlabs Facter | =2.0.1 | |
Puppetlabs Facter | =2.0.1-rc1 | |
Puppetlabs Facter | =2.0.1-rc2 | |
Puppetlabs Facter | =2.0.1-rc3 | |
Puppetlabs Facter | =2.0.1-rc4 | |
Facter | >=1.6.0<=1.6.18 | |
Puppet MCollective | <2.5.2 | |
Puppet Hiera | <1.3.4 | |
Puppet | <2.7.26 | |
Puppet | >=3.6.0<3.6.2 | |
Puppet Enterprise | >=2.8.0<2.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3248 is considered a moderate severity vulnerability as it allows local users to gain privileges within the affected software.
To fix CVE-2014-3248, upgrade the affected software to the recommended versions such as Puppet Enterprise 2.8.7 or newer.
CVE-2014-3248 affects Puppet Enterprise versions prior to 2.8.7, Puppet versions before 2.7.26 and 3.x before 3.6.2, and specific versions of Facter, Hiera, and MCollective.
Users running vulnerable versions of Puppet Enterprise, Puppet, Facter, Hiera, and MCollective, particularly with Ruby 1.9.1 or earlier are affected by CVE-2014-3248.
CVE-2014-3248 is an untrusted search path vulnerability that can permit local users to execute arbitrary code with higher privileges.