Tri sigurnosna propusta, koje su pronađena unutar paketa Puppet, su otklonjena. Zlonamjerni korisnik ih je mogao iskoristiti kako bi neovlašteno pristupio nekim datotekama ili ih izbrisao, te doveo do gašenja ranjivog programa.
Paket:
puppet 2.x
Operacijski sustavi:
SUSE Linux Enterprise Desktop 11, SUSE Linux Enterprise Server (SLES) 11
Kritičnost:
3.2
Problem:
nepravilno rukovanje ovlastima
Iskorištavanje:
udaljeno
Posljedica:
neovlašteni pristup sustavu, uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-3864, CVE-2012-3865, CVE-2012-3867
Izvorni ID preporuke:
SUSE-SU-2012:0983-1
Izvor:
SUSE
Problem:
Nedostaci se javljaju kod obrade GET zahtjeva te zbog pogrešaka u datotekama lib/puppet/reports/store.rb i lib/puppet/ssl/certificate_authority.rb.
Posljedica:
Ovi nedostaci omogućavali su napadaču neovlašeten pristup nekim datotekama te ih je i po želji mogao izbrisati, te tako dovesti do gašenja paketa. Također napadač je mogao poslati neispravan certifikat koji bi onda administrator pogrešno odobrio i omogućio tako MITM napad.
SUSE Security Update: Security update for puppet
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0983-1
Rating: important
References: #770828 #770829 #770833
Cross-References: CVE-2012-3864 CVE-2012-3865 CVE-2012-3867
Affected Products:
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that fixes three vulnerabilities is now
available. It includes one version update.
Description:
The following bugs have been fixed in puppet:
* bnc#770828, CVE-2012-3864: puppet: authenticated
clients can read arbitrary files via a flaw in puppet master
* bnc#770829, CVE-2012-3865: puppet: arbitrary file
delete / Denial of Service on Puppet Master by
authenticated clients
* bnc#770833, CVE-2012-3867: puppet: insufficient input
validation for agent certificate names
Security Issue references:
* CVE-2012-3867
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3867
>
* CVE-2012-3864
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3864
>
* CVE-2012-3865
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3865
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-puppet-6561
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-puppet-6561
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-puppet-6561
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-puppet-6561
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-puppet-6561
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New
Version: 2.6.17]:
puppet-2.6.17-0.3.1
puppet-server-2.6.17-0.3.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version:
2.6.17]:
puppet-2.6.17-0.3.1
puppet-server-2.6.17-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New
Version: 2.6.17]:
puppet-2.6.17-0.3.1
puppet-server-2.6.17-0.3.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2.6.17]:
puppet-2.6.17-0.3.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.17]:
puppet-2.6.17-0.3.1
References:
http://support.novell.com/security/cve/CVE-2012-3864.html
http://support.novell.com/security/cve/CVE-2012-3865.html
http://support.novell.com/security/cve/CVE-2012-3867.html
https://bugzilla.novell.com/770828
https://bugzilla.novell.com/770829
https://bugzilla.novell.com/770833
http://download.novell.com/patch/finder/?keywords=546d90cdf89ec25e98329eee8f67dd01
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke