Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html | patch vendor advisory |
http://www.debian.org/security/2011/dsa-2314 | vendor advisory |
http://secunia.com/advisories/46458 | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html | patch vendor advisory |
http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb | patch |
http://www.ubuntu.com/usn/USN-1223-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-1223-2 | vendor advisory |
https://puppet.com/security/cve/cve-2011-3869 |