Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.71697
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1419-1 (puppet-common)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to puppet-common
announced via advisory USN-1419-1.

Details:

It was discovered that Puppet used a predictable filename when downloading Mac
OS X package files. A local attacker could exploit this to overwrite arbitrary
files. (CVE-2012-1906)

It was discovered that Puppet incorrectly handled filebucket retrieval
requests. A local attacker could exploit this to read arbitrary files.
(CVE-2012-1986)

It was discovered that Puppet incorrectly handled filebucket store requests. A
local attacker could exploit this to perform a denial of service via resource
exhaustion. (CVE-2012-1987)

It was discovered that Puppet incorrectly handled filebucket requests. A local
attacker could exploit this to execute arbitrary code via a crafted file path.
(CVE-2012-1988)

It was discovered that Puppet used a predictable filename for the Telnet
connection log file. A local attacker could exploit this to overwrite arbitrary
files. This issue only affected Ubuntu 11.10. (CVE-2012-1989)

Solution:
The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
puppet-common 2.7.1-1ubuntu3.6

Ubuntu 11.04:
puppet-common 2.6.4-2ubuntu2.9

Ubuntu 10.04 LTS:
puppet-common 0.25.4-2ubuntu6.7

http://www.securityspace.com/smysecure/catid.html?in=USN-1419-1

CVSS Score:
6.0

CVSS Vector:
AV:L/AC:H/Au:R/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-1906
BugTraq ID: 52975
http://www.securityfocus.com/bid/52975
Debian Security Information: DSA-2451 (Google Search)
http://www.debian.org/security/2012/dsa-2451
http://projects.puppetlabs.com/issues/13260
http://secunia.com/advisories/48743
http://secunia.com/advisories/48748
http://secunia.com/advisories/48789
http://ubuntu.com/usn/usn-1419-1
XForce ISS Database: puppet-macosx-symlink(74793)
https://exchange.xforce.ibmcloud.com/vulnerabilities/74793
Common Vulnerability Exposure (CVE) ID: CVE-2012-1986
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html
http://projects.puppetlabs.com/issues/13511
http://secunia.com/advisories/49136
SuSE Security Announcement: openSUSE-SU-2012:0608 (Google Search)
https://hermes.opensuse.org/messages/14523305
SuSE Security Announcement: openSUSE-SU-2012:0835 (Google Search)
https://hermes.opensuse.org/messages/15087408
XForce ISS Database: puppet-rest-symlink(74794)
https://exchange.xforce.ibmcloud.com/vulnerabilities/74794
Common Vulnerability Exposure (CVE) ID: CVE-2012-1987
http://projects.puppetlabs.com/issues/13552
http://projects.puppetlabs.com/issues/13553
http://www.osvdb.org/81308
XForce ISS Database: puppet-rest-dos(74795)
Common Vulnerability Exposure (CVE) ID: CVE-2012-1988
http://projects.puppetlabs.com/issues/13518
http://www.osvdb.org/81309
XForce ISS Database: puppet-file-bucket-command-exec(74796)
https://exchange.xforce.ibmcloud.com/vulnerabilities/74796
Common Vulnerability Exposure (CVE) ID: CVE-2012-1989
http://projects.puppetlabs.com/issues/13606
http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html
XForce ISS Database: puppet-nettelnet-symlink(74797)
https://exchange.xforce.ibmcloud.com/vulnerabilities/74797
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.