|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Puppet: multiple vulnerabilities
Synthesis of the vulnerability
An attacker can use several vulnerabilities of Puppet.
Vulnerable products: Fedora, Solaris, Puppet, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this weakness: 2/4.
Consequences of a hack: privileged access/rights, user access/rights, data reading.
Hacker's origin: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 11/06/2014.
Références of this bulletin: CERTFR-2014-AVI-273, CVE-2014-3248, CVE-2014-3249, CVE-2014-3250, FEDORA-2014-12699, SUSE-SU-2014:0880-1, USN-3308-1, VIGILANCE-VUL-14886.
Description of the vulnerability
Several vulnerabilities were announced in Puppet.
An attacker can invite the victim to execute Puppet from a directory containing a Trojan, in order to execute code. [severity:2/4; CVE-2014-3248]
An attacker can obtain the list of facts for a node, in order to obtain sensitive information. [severity:2/4; CVE-2014-3249]
An attacker can use a revoked certificate. [severity:2/4; CVE-2014-3250]
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides systems vulnerabilities bulletins. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system.