Oracle Solaris Third-Party Patch Update : puppet (multiple_vulnerabilities_in_puppet1)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- Untrusted search path vulnerability in Puppet Enterprise
2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before
3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before
1.3.4, and Mcollective before 2.5.2, when running with
Ruby 1.9.1 or earlier, allows local users to gain
privileges via a Trojan horse file in the current
working directory, as demonstrated using (1)
rubygems/defaults/ operating_system.rb, (2) Win32API.rb,
(3) Win32API.so, (4) safe_yaml.rb, (5)
safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7)
operatingsystem.rb, (8) operatingsystem.so, (9)
osfamily.rb, or (10) osfamily.so in puppet/confine.
(CVE-2014-3248)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?20d8e18a

Solution :

Upgrade to Solaris 11.2.5.5.0.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80745 ()

Bugtraq ID:

CVE ID: CVE-2014-3248
CVE-2014-3250

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now