Ubuntu 10.04 LTS / 10.10 / 11.04 : puppet vulnerabilities (USN-1223-1)

Ubuntu Security Notice (C) 2011-2013 Canonical, Inc. / NASL script (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that Puppet unsafely opened files when the k5login
type is used to manage files. A local attacker could exploit this to
overwrite arbitrary files which could be used to escalate privileges.
(CVE-2011-3869)

Ricky Zhou discovered that Puppet did not drop privileges when
creating SSH authorized_keys files. A local attacker could exploit
this to overwrite arbitrary files as root. (CVE-2011-3870)

It was discovered that Puppet used a predictable filename when using
the --edit resource. A local attacker could exploit this to edit
arbitrary files or run arbitrary code as the user invoking the
program, typically root. (CVE-2011-3871).

Solution :

Update the affected puppet-common package.

Risk factor :

Medium / CVSS Base Score : 6.3
(CVSS2#AV:L/AC:M/Au:N/C:N/I:C/A:C)

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 56375 ()

Bugtraq ID:

CVE ID: CVE-2011-3869
CVE-2011-3870
CVE-2011-3871