[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2012-053 --- puppet

ID: oval:org.secpod.oval:def:1601258Date: (C)2020-11-27   (M)2021-09-11
Class: PATCHFamily: unix




Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3, when managing a user login file with the k5login resource type, allows local users to gain privileges via a symlink attack on .k5login.The change_user method in the SUIDManager in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to the change_user not dropping supplementary groups in certain conditions, changes to the eguid without associated changes to the egid, or the addition of the real gid to supplementary groups.

Platform:
Amazon Linux AMI
Product:
puppet
Reference:
ALAS-2012-53
CVE-2012-1053
CVE-2012-1054
CVE    2
CVE-2012-1053
CVE-2012-1054
CPE    4
cpe:/a:puppetlabs:puppet:2.7.1
cpe:/o:amazon:linux
cpe:/a:puppetlabs:puppet:2.7.0
cpe:/a:puppetlabs:puppet
...

© SecPod Technologies