First published: Tue May 27 2014(Updated: )
The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet by Puppet Labs | <3.6.2 | |
Apache HTTP Server | =2.4.0 | |
redhat linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3250 is classified as a medium severity vulnerability affecting Puppet versions before 3.6.2.
To fix CVE-2014-3250, upgrade Puppet to version 3.6.2 or later and ensure the SSLCARevocationCheck directive is included in your vhost configuration.
CVE-2014-3250 affects all Puppet versions prior to 3.6.2.
Yes, CVE-2014-3250 can allow remote attackers to potentially obtain sensitive information via a revoked certificate.
CVE-2014-3250 is associated with Apache HTTP Server version 2.4.