From owner-svn-ports-head@FreeBSD.ORG Tue Mar 26 18:09:07 2013
Return-Path: Secunia reports: A vulnerability has been reported in OptiPNG, which can be
- exploited by malicious people to potentially compromise a user's
- system. The vulnerability is caused due to a use-after-free error related
- to the palette reduction functionality. No further information is
- currently available. Success exploitation may allow execution of arbitrary code. Secunia reports: A vulnerability has been reported in OptiPNG, which can be
+ exploited by malicious people to potentially compromise a user's
+ system. The vulnerability is caused due to a use-after-free error related
+ to the palette reduction functionality. No further information is
+ currently available. Success exploitation may allow execution of arbitrary code. libexif project security advisory: libexif project security advisory: A number of remotely exploitable issues were discovered in libexif
and exif, with effects ranging from information leakage to potential
remote code execution.
-
+
+
+
A vulnerability found in Puppet could allow an authenticated client to connect to a puppet master and perform unauthorized actions. Specifically, given a valid certificate and private key, an agent @@ -285,8 +285,8 @@ Note: Please add new entries to the beg nodes, facts, and resources. The extent and severity of this vulnerability varies depending on the specific configuration of the master: for example, whether it is using storeconfigs or not, which - version, whether it has access to the cache or not, etc. -
+ version, whether it has access to the cache or not, etc. +A vulnerability has been found in Puppet which could allow authenticated clients to execute arbitrary code on agents that have been configured to accept kick connections. This vulnerability is @@ -296,27 +296,27 @@ Note: Please add new entries to the beg allow access to the `run` REST endpoint, then a client could construct an HTTP request which could execute arbitrary code. The severity of this issue is exacerbated by the fact that puppet - agents typically run as root. -
+ agents typically run as root. +A vulnerability has been found in Puppet that could allow a client negotiating a connection to a master to downgrade the master's SSL protocol to SSLv2. This protocol has been found to contain design weaknesses. This issue only affects systems running older versions (pre 1.0.0) of openSSL. Newer versions explicitly disable - SSLv2. -
+ SSLv2. +A vulnerability found in Puppet could allow unauthenticated clients to send requests to the puppet master which would cause it to load code unsafely. While there are no reported exploits, this vulnerability could cause issues like those described in Rails CVE-2013-0156. This vulnerability only affects puppet masters - running Ruby 1.9.3 and higher. -
+ running Ruby 1.9.3 and higher. +This vulnerability affects puppet masters 0.25.0 and above. By default, auth.conf allows any authenticated node to submit a report for any other node. This can cause issues with compliance. The - defaults in auth.conf have been changed. -
+ defaults in auth.conf have been changed. + @@ -358,8 +358,8 @@ Note: Please add new entries to the beg to cause the master to execute arbitrary code while responding to a catalog request. Specifically, in order to exploit the vulnerability, the puppet master must be made to invoke the - 'template' or 'inline_template' functions during catalog compilation. - + 'template' or 'inline_template' functions during catalog compilation. +A vulnerability found in Puppet could allow an authenticated client to connect to a puppet master and perform unauthorized actions. Specifically, given a valid certificate and private key, an agent @@ -369,28 +369,28 @@ Note: Please add new entries to the beg nodes, facts, and resources. The extent and severity of this vulnerability varies depending on the specific configuration of the master: for example, whether it is using storeconfigs or not, which - version, whether it has access to the cache or not, etc. -
+ version, whether it has access to the cache or not, etc. +A vulnerability has been found in Puppet that could allow a client negotiating a connection to a master to downgrade the master's SSL protocol to SSLv2. This protocol has been found to contain design weaknesses. This issue only affects systems running older versions (pre 1.0.0) of openSSL. Newer versions explicitly disable - SSLv2. -
+ SSLv2. +A vulnerability found in Puppet could allow an authenticated client to execute arbitrary code on a puppet master that is running in the default configuration, or an agent with `puppet kick` enabled. Specifically, a properly authenticated and connected puppet agent could be made to construct an HTTP PUT request for an authorized report that actually causes the execution of arbitrary code on the - master. -
+ master. +This vulnerability affects puppet masters 0.25.0 and above. By default, auth.conf allows any authenticated node to submit a report for any other node. This can cause issues with compliance. The - defaults in auth.conf have been changed. -
+ defaults in auth.conf have been changed. +