This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
Puppet's certificate authority issued Puppet agent certificates
capable of impersonating the Puppet master. Compromised or rogue
puppet agents could therefore use their certificates for MITM attacks
Note: If you've set the 'certdnsnames' option in your master's
puppet.conf file merely installing the updated packages is not
sufficient to fix this problem. You need to either pick a new DNS name
for the master and reconfigure all agents to use it or re-new
certificates on all agents.
Please refer to the documentation in
detailed instructions and scripts.
Puppetlabs' site also provides more information:
Directory traversal vulnerability in puppet allowed unauthenticated
remote attackers to upload x.509 certificate signing requests to
arbitrary locations (CVE-2011-3848)
Puppet was prone to several symlink attacks (CVE-2011-3870,
See also :
Update the affected puppet packages.
Risk factor :
Medium / CVSS Base Score : 6.3