Executive Summary

Informations
Name CVE-2012-1054 First vendor Publication 2012-05-29
Vendor Cve Last vendor Modification 2012-07-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.4 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3, when managing a user login file with the k5login resource type, allows local users to gain privileges via a symlink attack on .k5login.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1054

CWE : Common Weakness Enumeration

idName
CWE-264Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15218
 
Oval ID: oval:org.mitre.oval:def:15218
Title: USN-1372-1 -- Puppet vulnerabilities
Description: puppet: Centralized configuration management Puppet could be made to overwrite files and run programs with administrator privileges.
Family: unix Class: patch
Reference(s): USN-1372-1
CVE-2012-1053
CVE-2012-1054
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 10.04
Ubuntu 10.10
Product(s): Puppet
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15175
 
Oval ID: oval:org.mitre.oval:def:15175
Title: DSA-2419-1 puppet -- several
Description: Two vulnerabilities were discovered in Puppet, a centralized configuration management tool. CVE-2012-1053 Puppet runs execs with an unintended group privileges, potentially leading to privilege escalation. CVE-2012-1054 The k5login type writes to untrusted locations, enabling local users to escalate their privileges if the k5login type is used.
Family: unix Class: patch
Reference(s): DSA-2419-1
CVE-2012-1053
CVE-2012-1054
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): puppet
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application25
Application11

OpenVAS Exploits

DateDescription
2012-08-30Name : Fedora Update for puppet FEDORA-2012-2325
File : nvt/gb_fedora_2012_2325_puppet_fc17.nasl
2012-07-30Name : Fedora Update for puppet FEDORA-2012-10897
File : nvt/gb_fedora_2012_10897_puppet_fc16.nasl
2012-04-30Name : Fedora Update for puppet FEDORA-2012-5999
File : nvt/gb_fedora_2012_5999_puppet_fc16.nasl
2012-04-30Name : Fedora Update for puppet FEDORA-2012-6055
File : nvt/gb_fedora_2012_6055_puppet_fc15.nasl
2012-04-02Name : Fedora Update for puppet FEDORA-2012-2415
File : nvt/gb_fedora_2012_2415_puppet_fc16.nasl
2012-03-12Name : Fedora Update for puppet FEDORA-2012-2367
File : nvt/gb_fedora_2012_2367_puppet_fc15.nasl
2012-03-12Name : Gentoo Security Advisory GLSA 201203-03 (puppet)
File : nvt/glsa_201203_03.nasl
2012-03-12Name : Debian Security Advisory DSA 2419-1 (puppet)
File : nvt/deb_2419_1.nasl
2012-03-09Name : Ubuntu Update for puppet USN-1372-1
File : nvt/gb_ubuntu_USN_1372_1.nasl

Nessus® Vulnerability Scanner

DateDescription
2014-06-13Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-369.nasl - Type : ACT_GATHER_INFO
2013-09-04Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-53.nasl - Type : ACT_GATHER_INFO
2012-03-12Name : The remote Fedora host is missing a security update.
File : fedora_2012-2325.nasl - Type : ACT_GATHER_INFO
2012-03-12Name : The remote Fedora host is missing a security update.
File : fedora_2012-2367.nasl - Type : ACT_GATHER_INFO
2012-03-12Name : The remote Fedora host is missing a security update.
File : fedora_2012-2415.nasl - Type : ACT_GATHER_INFO
2012-03-06Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201203-03.nasl - Type : ACT_GATHER_INFO
2012-03-05Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_puppet-120224.nasl - Type : ACT_GATHER_INFO
2012-02-28Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2419.nasl - Type : ACT_GATHER_INFO
2012-02-24Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1372-1.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/52158
CONFIRM http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.14
http://puppetlabs.com/security/cve/cve-2012-1054/
DEBIAN http://www.debian.org/security/2012/dsa-2419
MISC http://projects.puppetlabs.com/issues/12460
OSVDB http://www.osvdb.org/79496
SECUNIA http://secunia.com/advisories/48157
http://secunia.com/advisories/48161
http://secunia.com/advisories/48166
http://secunia.com/advisories/48290
SUSE http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00003.html
https://hermes.opensuse.org/messages/15087408
UBUNTU http://ubuntu.com/usn/usn-1372-1
XF http://xforce.iss.net/xforce/xfdb/73446

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2014-06-14 13:32:28
  • Multiple Updates
2014-02-17 11:08:38
  • Multiple Updates
2013-05-10 22:34:34
  • Multiple Updates