Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Puppet Enterprise 2.8: multiple vulnerabilities

January 2014 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can use several vulnerabilities of Puppet Enterprise
2.8.

Impacted products: Debian, Puppet

Severity: 2/4

Creation date: 30/12/2013

DESCRIPTION OF THE VULNERABILITY

Several vulnerabilities were announced in Puppet Enterprise 2.8.

An attacker can generate a buffer overflow during the conversion
of real number by Ruby, in order to trigger a denial of service,
and possibly to execute code (VIGILANCE-VUL-13817
(https://vigilance.fr/tree/1/13817?w=66901)). [severity:2/4;
BID-63873, CERTA-2013-AVI-647, CVE-2013-4164]

An attacker can use a regular expression in RubyGems, in order to
trigger a denial of service. [severity:2/4; CVE-2013-4363]

An attacker can use a symbolic link, in order to corrupt a file.
[severity:2/4; BID-64552, CVE-2013-4969]

An attacker can trigger a Cross Site Scripting in Ruby on Rails,
in order to execute JavaScript code in the context of the web
site. [severity:2/4; CVE-2013-6415]

An attacker can use a SQL injection in Rack and Rails, in order to
read or alter data. [severity:2/4; CVE-2013-6417]

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Puppet-Enterprise-2-8-multiple-vulnerabilities-14000


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts