The Puppet master server could be impersonated in certain configurations.
It was discovered that Puppet incorrectly handled the non-default “certdnsnames” option when generating certificates. If this setting was added to puppet.conf, the puppet master’s DNS alt names were added to the X.509 Subject Alternative Name field of all certificates, not just the puppet master’s certificate. An attacker that has an incorrect agent certificate in his possession can use it to impersonate the puppet master in a man-in-the-middle attack.
24 October 2011
A security issue affects these releases of Ubuntu and its derivatives:
The Puppet master server could be impersonated in certain configurations.
It was discovered that Puppet incorrectly handled the non-default “certdnsnames” option when generating certificates. If this setting was added to puppet.conf, the puppet master’s DNS alt names were added to the X.509 Subject Alternative Name field of all certificates, not just the puppet master’s certificate. An attacker that has an incorrect agent certificate in his possession can use it to impersonate the puppet master in a man-in-the-middle attack.
The problem can be corrected by updating your system to the following package versions:
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
If your puppet master’s puppet.conf file has ever contained the “certdnsnames” setting, you must reissue your site certificates, or apply another mitigation technique. Please see the upstream advisory for more information:
http://puppetlabs.com/security/cve/cve-2011-3872/