CVE-2010-0156

Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or (4) /tmp/puppetdoc.aux temporary file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:0.24.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.4:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.5:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.6:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.6:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.6:rc2:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.7:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.7:rc2:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.8:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.24.8:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.0:beta1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.0:beta2:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.0:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.1:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.1:rc2:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.2:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.2:rc2:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:0.25.2:rc3:*:*:*:*:*:*

History

21 Nov 2024, 01:11

Type Values Removed Values Added
References () http://groups.google.com/group/puppet-announce/browse_thread/thread/4401823f6cbf6087 - Patch () http://groups.google.com/group/puppet-announce/browse_thread/thread/4401823f6cbf6087 - Patch
References () http://groups.google.com/group/puppet-announce/browse_thread/thread/73cd1b2896d986c2 - () http://groups.google.com/group/puppet-announce/browse_thread/thread/73cd1b2896d986c2 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036083.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036083.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036166.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036166.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html -
References () http://secunia.com/advisories/38766 - Patch, Vendor Advisory () http://secunia.com/advisories/38766 - Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=502881 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=502881 - Patch
References () https://puppet.com/security/cve/cve-2010-0156 - () https://puppet.com/security/cve/cve-2010-0156 -

Information

Published : 2010-03-03 19:30

Updated : 2024-11-21 01:11


NVD link : CVE-2010-0156

Mitre link : CVE-2010-0156

CVE.ORG link : CVE-2010-0156


JSON object : View

Products Affected

puppet

  • puppet
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')