Unspecified vulnerability in Puppet 2.6.x prior to 2.6.15 and 2.7.x prior to 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x prior to 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
puppet puppet 2.6.6 |
||
puppet puppet 2.6.5 |
||
puppet puppet 2.6.13 |
||
puppet puppet 2.6.12 |
||
puppet puppet 2.6.4 |
||
puppet puppet 2.6.3 |
||
puppet puppet 2.6.9 |
||
puppet puppet 2.6.8 |
||
puppet puppet 2.6.7 |
||
puppet puppet 2.6.0 |
||
puppet puppet 2.6.14 |
||
puppet puppet 2.6.11 |
||
puppet puppet 2.6.10 |
||
puppet puppet 2.6.2 |
||
puppet puppet 2.6.1 |
||
puppet puppet 2.7.10 |
||
puppetlabs puppet 2.7.1 |
||
puppetlabs puppet 2.7.0 |
||
puppet puppet 2.7.9 |
||
puppet puppet 2.7.8 |
||
puppet puppet 2.7.4 |
||
puppet puppet 2.7.3 |
||
puppet puppet 2.7.5 |
||
puppet puppet 2.7.2 |
||
puppet puppet 2.7.7 |
||
puppet puppet 2.7.6 |
||
puppet puppet 2.7.11 |
||
puppet puppet enterprise 2.5.0 |
||
puppet puppet enterprise 1.2.0 |
||
puppet puppet enterprise 2.0.1 |
||
puppet puppet enterprise 1.2.1 |
||
puppet puppet enterprise 1.2.2 |
||
puppetlabs puppet enterprise users 1.0 |
||
puppetlabs puppet enterprise users 1.1 |
||
puppet puppet enterprise 2.0.0 |
||
puppet puppet enterprise 2.0.2 |
||
puppet puppet enterprise 1.2.3 |
||
puppet puppet enterprise 1.2.4 |