Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0072 Multiple vulnerabilities have been identified in Puppet Enterprise (2.8) and Puppet (all) 16 June 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Puppet Enterprise Puppet Operating System: UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-3249 CVE-2014-3248 Member content until: Wednesday, July 16 2014 OVERVIEW Multiple vulnerabilities have been identified in Puppet Enterprise (2.8) and Puppet (all). [1 - 2] IMPACT The vendor has provided the following details regarding two vulnerabilities: "CVE-2014-3248 (Arbitrary Code Execution with Required Social Engineering) Posted June 10, 2014 Assessed Risk Level: Medium On platforms with Ruby 1.9.1 or earlier, an attacker could have Puppet execute malicious code by convincing a privileged user to change directories to one containing the malicious code and then run Puppet. CVSSv2 Score: 5.2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C" [1] "CVE-2014-3249 (Information leakage) Posted June 10, 2014 Assessed Risk Level: Low Unauthenticated users could hide and unhide nodes in the Console and get a list of facts for a node. CVSSv2 Score: 3.9 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C" [2] MITIGATION The vendor recommends updating to the latest versions of Puppet Enterprise and Puppet to correct these issues. [1, 2] REFERENCES [1] CVE-2014-3248 http://puppetlabs.com/security/cve/cve-2014-3248 [2] CVE-2014-3249 http://puppetlabs.com/security/cve/cve-2014-3249 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU55AHxLndAQH1ShLAQIU3A//S9RyxtPEGArOcusIAOO/hl28Qsmv7Vrx T5mMTnkyjZ9roaDaSbxHqceYp8JvME4FwcVJQD8eOjeIH8UDmyF6biDjlDgZ/vOj u0ogq6JmKfPvkUqKtgRnpdkhmDhlzQeevLyelonToea3HLK3G0ZzcblezlsDk92f 48YXkuAGCqv/VaCHaiaSihF4xWVUuCvzXlMP5JLS+48XIQOhe2xtbZpamO5L1sGG nws8cSpmCtSgUncRT9tJ8e49H2LJKifAxtcXQwEoVlhqtz1GrTlt2zsN0raxqFcr ace7vAK48O3AAmxQI4lwd6E+Zjt3QPyLR/pEmV6IKdUX4dncsSXjR3PhTSvWWA62 m5T1F1yVm60PqedO/xuAI7qFppZrFP9rr4YiNJhk+6K5t9NeMIA/ZongFxwij9a7 x/6AUQHbjtKO+WicYpmUPqNDgM8f2Oe1EPLZtuFhxIozdYUBez/6ZT4Ll4WA7dqg 1Vn8lgT45sutBOPxpnxo2A9+bnqzjj3vRZd9/Z756qpI9GRRcJEopPR/jps4QQk2 jIGG8kvtfJ7G78B16Fns8V/TX+fF+WDtAVKUXnsG9wPFQz43LJqQk6ar+vzE1i/h LQlahIbw2tC/SW0hOGY5LtH+54VpyuqsyJjedRV3Xw0vNUUcKbKm02EUiG2uZh0m C+1kjFaUcpU= =vm8Y -----END PGP SIGNATURE-----