-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0072
          Multiple vulnerabilities have been identified in Puppet
                     Enterprise (2.8) and Puppet (all)
                               16 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Puppet Enterprise
                      Puppet
Operating System:     UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Access Confidential Data        -- Remote/Unauthenticated      
Resolution:           Patch/Upgrade
CVE Names:            CVE-2014-3249 CVE-2014-3248 
Member content until: Wednesday, July 16 2014

OVERVIEW

        Multiple vulnerabilities have been identified in Puppet Enterprise 
        (2.8) and Puppet (all). [1 - 2]


IMPACT

        The vendor has provided the following details regarding two 
        vulnerabilities:
        
        "CVE-2014-3248 (Arbitrary Code Execution with Required Social 
        Engineering)
        
        Posted June 10, 2014 
        Assessed Risk Level: Medium
        
        On platforms with Ruby 1.9.1 or earlier, an attacker could have 
        Puppet execute malicious code by convincing a privileged user to 
        change directories to one containing the malicious code and then run
        Puppet.
        
        CVSSv2 Score: 5.2
        
        Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C" [1]
        
        "CVE-2014-3249 (Information leakage)
        
        Posted June 10, 2014
        Assessed Risk Level: Low
        
        Unauthenticated users could hide and unhide nodes in the Console and 
        get a list of facts for a node.
        
        CVSSv2 Score: 3.9
        
        Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C" [2]


MITIGATION

        The vendor recommends updating to the latest versions of Puppet
        Enterprise and Puppet to correct these issues. [1, 2]


REFERENCES

        [1] CVE-2014-3248
            http://puppetlabs.com/security/cve/cve-2014-3248

        [2] CVE-2014-3249
            http://puppetlabs.com/security/cve/cve-2014-3249

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=vm8Y
-----END PGP SIGNATURE-----