The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability alert CVE-2014-3248 CVE-2014-3249 CVE-2014-3250

Puppet: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Puppet.
Vulnerable products: Fedora, Solaris, Puppet, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this weakness: 2/4.
Consequences of a hack: privileged access/rights, user access/rights, data reading.
Hacker's origin: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 11/06/2014.
Références of this bulletin: CERTFR-2014-AVI-273, CVE-2014-3248, CVE-2014-3249, CVE-2014-3250, FEDORA-2014-12699, SUSE-SU-2014:0880-1, USN-3308-1, VIGILANCE-VUL-14886.

Description of the vulnerability

Several vulnerabilities were announced in Puppet.

An attacker can invite the victim to execute Puppet from a directory containing a Trojan, in order to execute code. [severity:2/4; CVE-2014-3248]

An attacker can obtain the list of facts for a node, in order to obtain sensitive information. [severity:2/4; CVE-2014-3249]

An attacker can use a revoked certificate. [severity:2/4; CVE-2014-3250]
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides systems vulnerabilities bulletins. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system.