GLSA-201701-77 : Ansible: Remote execution of arbitrary code

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201701-77
(Ansible: Remote execution of arbitrary code)

An input validation vulnerability was found in Ansible’s handling of
data sent from client systems.

Impact :

An attacker with control over a client system being managed by Ansible
and the ability to send facts back to the Ansible server could execute
arbitrary code on the Ansible server using the Ansible-server privileges.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201701-77

Solution :

All Ansible 2.1.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-admin/ansible-2.1.4.0_rc3'
All Ansible 2.2.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-admin/ansible-2.2.1.0_rc5'

Risk factor :

Medium

Family: Gentoo Local Security Checks

Nessus Plugin ID: 96915 ()

Bugtraq ID:

CVE ID: CVE-2016-9587

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now