Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : puppet vulnerabilities (USN-1506-1)

Ubuntu Security Notice (C) 2012-2013 Canonical, Inc. / NASL script (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that Puppet incorrectly handled certain HTTP GET
requests. An attacker could use this flaw with a valid client
certificate to retrieve arbitrary files from the Puppet master.
(CVE-2012-3864)

It was discovered that Puppet incorrectly handled Delete requests. If
a Puppet master were reconfigured to allow the 'Delete' method, an
attacker on an authenticated host could use this flaw to delete
arbitrary files from the Puppet server, leading to a denial of
service. (CVE-2012-3865)

It was discovered that Puppet incorrectly set file permissions on the
last_run_report.yaml file. An attacker could use this flaw to access
sensitive information. This issue only affected Ubuntu 11.10 and
Ubuntu 12.04 LTS. (CVE-2012-3866)

It was discovered that Puppet incorrectly handled agent certificate
names. An attacker could use this flaw to create a specially crafted
certificate and trick an administrator into signing a certificate that
can then be used to man-in-the-middle agent nodes. (CVE-2012-3867).

Solution :

Update the affected puppet-common package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.2
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 59965 ()

Bugtraq ID: 54399

CVE ID: CVE-2012-3864
CVE-2012-3865
CVE-2012-3866
CVE-2012-3867