Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2013.0117 Multiple vulnerabilities have been identified in Puppet Enterprise 28 October 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Puppet Operating System: UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2013-4965 CVE-2013-4957 Member content until: Wednesday, November 27 2013 OVERVIEW Multiple vulnerabilities have been identified in Puppet Enterprise prior to version 3.1.0. [1 - 2] IMPACT The vendor has provided the following details regarding two vulnerabilities: "CVE-2013-4957 (Puppet Dashboard Report YAML Handling Vulnerability) Posted October 15, 2013 Assessed Risk Level: Medium Systems that rely on YAML to create report-specific types were found to be at risk of arbitrary code execution vulnerabilities." [1] "CVE-2013-4965 (Console account brute force vulnerability) Posted October 15, 2013 Assessed Risk Level: Low A user's account was not locked out after the user submitted a large number of invalid login attempts, leaving the account vulnerable to brute force attack. Now the account is locked after 10 failed attempts." [2] MITIGATION The vendor recommends updating to the latest versions of Puppet Enterprise to correct these issues. [1, 2] REFERENCES [1] CVE-2013-4957 http://puppetlabs.com/security/cve/cve-2013-4957 [2] CVE-2013-4965 http://puppetlabs.com/security/cve/cve-2013-4965 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUm3vAhLndAQH1ShLAQLOvA/+PtO3ufpKMRLmruAfAOyG6D26SJmRA25L S+7s/FT0lHThGnCCl/VukSPjBSBpNv1PegD4kB+E1KTlwcoLDlC2LyZNzNlMC85Y 8DkQgkC9vWLZxdwZ6IdwvKNi6hOrIUtW7X8wO9jLVY5C14fBPa0r2aYP/mgZi9ow SMVfpuak3mpD+a+BEeVJKcY7onZ9NvGVXYsQfHZ4GV7/jWnVs6RVQXyy3MR7jGpC oA7UhgXA/NSOotV2ZgfeEjAIJe1ItFIU4DrDC5jirL9Qp9lY/NxVqPfeAp/RDCBS d2pitZZUnR5rFyjosB01BlZOZERANMzlGQiNFhcZYA5JYc0kSIJIIUeDoNX2cd9Q /dAP/46YKLGUafYX2CiCahW+KaMfqKr91OB0g2/MhRX3aq3/Ppreq1OCb8qBur/D ggMaXkDn1U+YAT8SAfsbZSlzF9y1CCbyTmMdLD9CdFYKSMbfwoI5ViXIpeadQnsR ZHow4H3BtWqVUy92J7isvTnmvJ2+FQuzF6/8rvpHdnoUvZFtknTvo/gqu7vNe+l/ EXiC78w9xSVlcD8T6gnE0lOXx5JEFMcJryWp5kjU6OO6cVgdUlMwKribO/S0gBMp aZtYQ8Mm+D/pqlK55AVpYuz1C63MHORZFyobmzWmkuKMY9Q+K2AbnbG5jrrGHO2C HRSXLfiVrkc= =TDP4 -----END PGP SIGNATURE-----