Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for puppet (ALAS-2012-53) (multiple CVEs)

Back to Search

Amazon Linux AMI: Security patch for puppet (ALAS-2012-53) (multiple CVEs)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
05/29/2012
Created
07/25/2018
Added
02/28/2014
Modified
07/04/2017

Description

The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the change_user not dropping supplementary groups in certain conditions, (2) changes to the eguid without associated changes to the egid, or (3) the addition of the real gid to supplementary groups.

Solution(s)

  • amazon-linux-upgrade-puppet
  • amazon-linux-upgrade-puppet-debuginfo
  • amazon-linux-upgrade-puppet-server

References

  • amazon-linux-upgrade-puppet
  • amazon-linux-upgrade-puppet-debuginfo
  • amazon-linux-upgrade-puppet-server

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;