[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2011-011 --- puppet

ID: oval:org.secpod.oval:def:1601223Date: (C)2020-11-27   (M)2021-06-02
Class: PATCHFamily: unix




Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.

Platform:
Amazon Linux AMI
Product:
puppet
Reference:
ALAS-2011-11
CVE-2011-3869
CVE-2011-3870
CVE-2011-3871
CVE    3
CVE-2011-3869
CVE-2011-3870
CVE-2011-3871
CPE    4
cpe:/a:puppetlabs:puppet:2.7.1
cpe:/o:amazon:linux
cpe:/a:puppetlabs:puppet:2.7.0
cpe:/a:puppetlabs:puppet
...

© SecPod Technologies