This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.
The remote SuSE 11 host is missing one or more security updates.
The following security issues have been fixed :
- Puppet's certificate authority issued Puppet agent
certificates capable of impersonating the Puppet master.
Compromised or rogue puppet agents could therefore use
their certificates for MITM attacks. (CVE-2011-3872)
Note: If you've set the 'certdnsnames' option in your
master's puppet.conf file merely installing the updated
packages is not sufficient to fix this problem. You need
to either pick a new DNS name for the master and
reconfigure all agents to use it or re-new certificates
on all agents.
Please refer to the documentation in
0.5 for detailed instructions and scripts.
Puppetlabs' site also provides more information:
- Directory traversal vulnerability in puppet allowed
unauthenticated remote attackers to upload x.509
certificate signing requests to arbitrary locations.
- Puppet was prone to several symlink attacks
(CVE-2011-3870 / CVE-2011-3869 / CVE-2011-3871)
See also :
Apply SAT patch number 5421.
Risk factor :
Medium / CVSS Base Score : 6.3