-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0026
  CVE-2013-4966 (Master external node classification script vulnerable to
         console impersonation) and CVE-2013-4971 (Unauthenticated
            access to node endpoints could cause data leakage)
                               13 March 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Puppet
Operating System:     UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Access Confidential Data -- Remote/Unauthenticated
                      Modify Arbitrary Files   -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2013-4971 CVE-2013-4966 
Member content until: Friday, April 11 2014

OVERVIEW

        Multiple vulnerabilities have been identified in Puppet Enterprise
        prior to version 3.2.0 [1 - 2]


IMPACT

        The vendor has provided the following details regarding two
        vulnerabilities:
        
        "CVE-2013-4966 (Master external node classification script vulnerable 
        to console impersonation)
        
        * Posted March 4, 2014
        * Assessed Risk Level: Medium
        
        The script that the PE master used to contact the PE console for node 
        classification did not verify the identity of the console. This 
        introduced a vulnerability in which an attacker could impersonate the 
        console and submit malicious classification to the master." [1]
        
        "CVE-2013-4971 (Unauthenticated access to node endpoints could cause 
        data leakage)
        
        * Posted March 4, 2014
        * Assessed Risk Level: Medium
        
        Unauthenticated read access to the node endpoint in the console could 
        result in information leakage in PE versions earlier than 3.2." [2] 


MITIGATION

        The vendor recommends updating to the latest versions of Puppet
        Enterprise to correct these issues. [1, 2]


REFERENCES

        [1] CVE-2013-4966
            http://puppetlabs.com/security/cve/cve-2013-4966

        [2] CVE-2013-4971
            http://puppetlabs.com/security/cve/cve-2013-4971

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pO2b
-----END PGP SIGNATURE-----