Ubuntu 11.10 / 12.04 LTS / 12.10 : puppet vulnerabilities (USN-1759-1)

Ubuntu Security Notice (C) 2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that Puppet agents incorrectly handled certain kick
connections in a non-default configuration. An attacker on an
authenticated client could use this issue to possibly execute
arbitrary code. (CVE-2013-1653)

It was discovered that Puppet incorrectly handled certain catalog
requests. An attacker on an authenticated client could use this issue
to possibly execute arbitrary code on the master. (CVE-2013-1640)

It was discovered that Puppet incorrectly handled certain client
requests. An attacker on an authenticated client could use this issue
to possibly perform unauthorized actions. (CVE-2013-1652)

It was discovered that Puppet incorrectly handled certain SSL
connections. An attacker could use this issue to possibly downgrade
connections to SSLv2. (CVE-2013-1654)

It was discovered that Puppet incorrectly handled serialized
attributes. An attacker on an authenticated client could use this
issue to possibly cause a denial of service, or execute arbitrary.
(CVE-2013-1655)

It was discovered that Puppet incorrectly handled submitted reports.
An attacker on an authenticated node could use this issue to possibly
submit a report for any other node. (CVE-2013-2275).

Solution :

Update the affected puppet-common package.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 65251 ()

Bugtraq ID:

CVE ID: CVE-2013-1640
CVE-2013-1652
CVE-2013-1653
CVE-2013-1654
CVE-2013-1655
CVE-2013-2275