Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2010-0156
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or (4) /tmp/puppetdoc.aux temporary file..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.3/10
- Exploit Score
- 3.4/10
- Access Vector
- Local
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 4.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:puppet:puppet:0.24.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.0:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.1:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.6:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.7:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.2:rc3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.2:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.1:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.2:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.25.0:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.8:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:puppet:puppet:0.24.6:rc2:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://groups.google.com/group/puppet-announce/browse_thread/thread/4401823f6cbf6087
- http://secunia.com/advisories/38766
- http://groups.google.com/group/puppet-announce/browse_thread/thread/73cd1b2896d986c2
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036166.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036083.html
- https://bugzilla.redhat.com/show_bug.cgi?id=502881
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
- https://puppet.com/security/cve/cve-2010-0156