|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-1223-2 (puppet-common)|
|Summary:||Ubuntu USN-1223-2 (puppet-common)|
The remote host is missing an update to puppet-common
announced via advisory USN-1223-2.
USN-1223-1 fixed vulnerabilities in Puppet. A regression was found on
Ubuntu 10.04 LTS that caused permission denied errors when managing SSH
authorized_keys files with Puppet. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Puppet unsafely opened files when the k5login type
is used to manage files. A local attacker could exploit this to overwrite
arbitrary files which could be used to escalate privileges. (CVE-2011-3869)
Ricky Zhou discovered that Puppet did not drop privileges when creating
SSH authorized_keys files. A local attacker could exploit this to overwrite
arbitrary files as root. (CVE-2011-3870)
It was discovered that Puppet used a predictable filename when using the
--edit resource. A local attacker could exploit this to edit arbitrary
files or run arbitrary code as the user invoking the program, typically
The problem can be corrected by updating your system to the following
Ubuntu 10.04 LTS:
Common Vulnerability Exposure (CVE) ID: CVE-2011-3869|
Debian Security Information: DSA-2314 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2011-3870
Common Vulnerability Exposure (CVE) ID: CVE-2011-3871
|Copyright||Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com|
|This is only one of 55704 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.