CVE-2012-1989

telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html - () http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html -
References () http://projects.puppetlabs.com/issues/13606 - () http://projects.puppetlabs.com/issues/13606 -
References () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13 - () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13 -
References () http://puppetlabs.com/security/cve/cve-2012-1989/ - Vendor Advisory () http://puppetlabs.com/security/cve/cve-2012-1989/ - Vendor Advisory
References () http://secunia.com/advisories/48743 - Vendor Advisory () http://secunia.com/advisories/48743 - Vendor Advisory
References () http://secunia.com/advisories/48748 - Vendor Advisory () http://secunia.com/advisories/48748 - Vendor Advisory
References () http://secunia.com/advisories/49136 - Vendor Advisory () http://secunia.com/advisories/49136 - Vendor Advisory
References () http://ubuntu.com/usn/usn-1419-1 - () http://ubuntu.com/usn/usn-1419-1 -
References () http://www.securityfocus.com/bid/52975 - () http://www.securityfocus.com/bid/52975 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74797 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/74797 -
References () https://hermes.opensuse.org/messages/15087408 - () https://hermes.opensuse.org/messages/15087408 -

Information

Published : 2012-06-27 18:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-1989

Mitre link : CVE-2012-1989

CVE.ORG link : CVE-2012-1989


JSON object : View

Products Affected

puppet

  • puppet_enterprise
  • puppet

puppetlabs

  • puppet
CWE
CWE-264

Permissions, Privileges, and Access Controls