First published: Tue Apr 12 2016(Updated: )
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | >=2015.8.0rc1<2015.8.4 | 2015.8.4 |
SaltStack Salt | =2015.8.0 | |
SaltStack Salt | =2015.8.1 | |
SaltStack Salt | =2015.8.2 | |
SaltStack Salt | =2015.8.3 | |
openSUSE | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1866 has a high severity rating due to its potential for arbitrary code execution.
To fix CVE-2016-1866, upgrade Salt to version 2015.8.4 or later.
CVE-2016-1866 affects Salt versions 2015.8.0 through 2015.8.3.
Yes, CVE-2016-1866 can allow man-in-the-middle attackers to execute arbitrary code.
CVE-2016-1866 impacts systems running Salt versions prior to 2015.8.4, including specific openSUSE versions.