Ubuntu 11.04 : puppet regression (USN-1238-2)

high Nessus Plugin ID 56637

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

USN-1238-1 fixed vulnerabilities in Puppet. The upstream patch introduced a regression in Ubuntu 11.04 when executing certain commands. This update fixes the problem.

We apologize for the inconvenience.

It was discovered that Puppet incorrectly handled the non-default 'certdnsnames' option when generating certificates. If this setting was added to puppet.conf, the puppet master's DNS alt names were added to the X.509 Subject Alternative Name field of all certificates, not just the puppet master's certificate. An attacker that has an incorrect agent certificate in his possession can use it to impersonate the puppet master in a man-in-the-middle attack.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected puppet-common package.

See Also

https://usn.ubuntu.com/1238-2/

Plugin Details

Severity: High

ID: 56637

File Name: ubuntu_USN-1238-2.nasl

Version: 1.7

Type: local

Agent: unix

Published: 10/26/2011

Updated: 9/19/2019

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:puppet-common, cpe:/o:canonical:ubuntu_linux:11.04

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Patch Publication Date: 10/25/2011

Vulnerability Publication Date: 10/25/2011

Reference Information

USN: 1238-2