Date: Sun, 30 Dec 2012 23:13:04 +0000 (UTC) From: Anders Nordby <anders@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r309700 - head/security/vuxml Message-ID: <201212302313.qBUND5WK006395@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: anders Date: Sun Dec 30 23:13:04 2012 New Revision: 309700 URL: http://svnweb.freebsd.org/changeset/ports/309700 Log: Separate entries for Puppet 2.6 and 2.7. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Dec 30 23:01:50 2012 (r309699) +++ head/security/vuxml/vuln.xml Sun Dec 30 23:13:04 2012 (r309700) @@ -51,6 +51,39 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="101f0aae-52d1-11e2-87fe-f4ce46b9ace8"> + <topic>puppet -- multiple vulnerabilities</topic> + <affects> + <package> + <name>puppet</name> + <range><gt>2.6.*</gt><lt>2.6.17</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>puppet -- multiple vulnerabilities</p> + <blockquote cite="http://projects.puppetlabs.com/projects/puppet/wiki/Release_Notes#2.6.17"> + <p>Arbitrary file read on the puppet master from authenticated clients (high). It is possible to construct an HTTP get request from an authenticated client with a valid certificate that will return the contents of an arbitrary file on the Puppet master that the master has read-access to.</p> + <p>Arbitrary file delete/D.O.S on Puppet Master from authenticated clients (high). Given a Puppet master with the "Delete" directive allowed in auth.conf for an authenticated host, an attacker on that host can send a specially crafted Delete request that can cause an arbitrary file deletion on the Puppet master, potentially causing a denial of service attack. Note that this vulnerability does *not* exist in Puppet as configured by default.</p> + <p>Insufficient input validation for agent hostnames (low). An attacker could trick the administrator into signing an attacker's certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker's certificate, the attacker can then man-in-the-middle the agent.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-3864</cvename> + <cvename>CVE-2012-3865</cvename> + <cvename>CVE-2012-3867</cvename> + <url>http://projects.puppetlabs.com/projects/puppet/wiki/Release_Notes#2.6.17</url> + <url>http://puppetlabs.com/security/cve/cve-2012-3864/</url> + <url>http://puppetlabs.com/security/cve/cve-2012-3865/</url> + <url>http://puppetlabs.com/security/cve/cve-2012-3867/</url> + </references> + <dates> + <discovery>2012-07-10</discovery> + <entry>2012-12-30</entry> + </dates> + </vuln> + <vuln vid="13320091-52a6-11e2-a289-1c4bd681f0cf"> <topic>otrs -- XSS vulnerability</topic> <affects> @@ -5097,7 +5130,7 @@ executed in your Internet Explorer while <affects> <package> <name>puppet</name> - <range><lt>2.7.18</lt></range> + <range><gt>2.7.*</gt><lt>2.7.18</lt></range> </package> </affects> <description> @@ -7485,7 +7518,7 @@ executed in your Internet Explorer while <affects> <package> <name>puppet</name> - <range><lt>2.7.12_1</lt></range> + <range><gt>2.7.*</gt><lt>2.7.12_1</lt></range> </package> </affects> <description>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201212302313.qBUND5WK006395>