Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0026 CVE-2013-4966 (Master external node classification script vulnerable to console impersonation) and CVE-2013-4971 (Unauthenticated access to node endpoints could cause data leakage) 13 March 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Puppet Operating System: UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Confidential Data -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-4971 CVE-2013-4966 Member content until: Friday, April 11 2014 OVERVIEW Multiple vulnerabilities have been identified in Puppet Enterprise prior to version 3.2.0 [1 - 2] IMPACT The vendor has provided the following details regarding two vulnerabilities: "CVE-2013-4966 (Master external node classification script vulnerable to console impersonation) * Posted March 4, 2014 * Assessed Risk Level: Medium The script that the PE master used to contact the PE console for node classification did not verify the identity of the console. This introduced a vulnerability in which an attacker could impersonate the console and submit malicious classification to the master." [1] "CVE-2013-4971 (Unauthenticated access to node endpoints could cause data leakage) * Posted March 4, 2014 * Assessed Risk Level: Medium Unauthenticated read access to the node endpoint in the console could result in information leakage in PE versions earlier than 3.2." [2] MITIGATION The vendor recommends updating to the latest versions of Puppet Enterprise to correct these issues. [1, 2] REFERENCES [1] CVE-2013-4966 http://puppetlabs.com/security/cve/cve-2013-4966 [2] CVE-2013-4971 http://puppetlabs.com/security/cve/cve-2013-4971 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUyE61xLndAQH1ShLAQKfURAAgmFd8+tjUYMu5UyR1Qwd0AyXKSOPcmNO wiUmLxJBj4fMVXBol7UDB1R3a/oJxOo5racNdYqXiW6dcv1xHwrH5lkM7R1EOQ7o Fv5vdoFfZojFGsCEp03+l0sKrGNlzTKaZ59BqBYETXT+FleiUnEsnuhhXVtYAQcn znU9g6y+yAbG9DWYSiepFtdJq7dZj2gMKjRL47Sg7v2S/OJZ5AndOD00uE3x4w6o aegKKoQR9x4e93BBZmIh1aTT3gJITsQ2Q/UHUqzkB0eU23odH+ASI5BmUA6/JgCU /Sv7lFaGo1UVGB3ONrun7jKsu2DHA3LyLw5lqcvGpWAbrGguZgizIwK6B3sYuL1W OcMn3qB44GKLp3egBpT/XHDkiui5Hzn/JKLCFZgvnAC0BZWe2IDrdnNSNSCoy9B5 nSPZWW14Pcag8N7I5Nq6uEl13DYOBWqhk6SIGtCsvZRs6rm8NhwJwnolI8U8fqxT N9ZKZc21eAV7A0+QaFz/mdhYU4aiKC3P+OBpzP1kdVqbtlA2yLZM6OFoxNnEldUp KSWQA82bkyv6DdLC0NtTT+Jx8ohgiglZNannEmSUbR8zkvllMZQtp/SW+JS/Vhii BCKD1DTbARElk+KBpRV2vxvrUPc0bnPnJjzrk8wTFPdA154YbOtDLfccLvXWEzSQ zl+7epArNQY= =pO2b -----END PGP SIGNATURE-----