Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0710.html - | |
References | () http://secunia.com/advisories/52596 - Vendor Advisory | |
References | () http://ubuntu.com/usn/usn-1759-1 - | |
References | () http://www.debian.org/security/2013/dsa-2643 - | |
References | () http://www.securityfocus.com/bid/64758 - | |
References | () https://puppetlabs.com/security/cve/cve-2013-1654/ - Vendor Advisory |
Information
Published : 2013-03-20 16:55
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1654
Mitre link : CVE-2013-1654
CVE.ORG link : CVE-2013-1654
JSON object : View
Products Affected
puppet
- puppet_enterprise
- puppet
puppetlabs
- puppet
canonical
- ubuntu_linux
CWE