Vulnerability CVE-2011-3872


Published: 2011-10-27   Modified: 2012-02-13

Description:
Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Puppetlabs -> Puppet 
Puppetlabs -> Puppet enterprise users 
Puppet -> Puppet 
Puppet -> Puppet enterprise 

 References:
http://groups.google.com/group/puppet-announce/browse_thread/thread/e7edc3a71348f3e1
http://puppetlabs.com/blog/important-security-announcement-altnames-vulnerability/
http://www.securityfocus.com/bid/50356
http://www.ubuntu.com/usn/USN-1238-1
http://www.ubuntu.com/usn/USN-1238-2
https://exchange.xforce.ibmcloud.com/vulnerabilities/70970
https://puppet.com/security/cve/cve-2011-3872

Copyright 2024, cxsecurity.com

 

Back to Top