Bug 748447 (CVE-2011-3872) - CVE-2011-3872 puppet: MITM by the x509v3 certificate signing
Summary: CVE-2011-3872 puppet: MITM by the x509v3 certificate signing
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-3872
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 748650 748651 748652 790898 790917 801972
Blocks: 742180 748458
TreeView+ depends on / blocked
 
Reported: 2011-10-24 13:44 UTC by Jan Lieskovsky
Modified: 2021-02-24 14:25 UTC (History)
6 users (show)

Fixed In Version: puppet 2.6.12, puppet 2.7.6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-07-04 06:56:34 UTC
Embargoed:


Attachments (Terms of Use)
Local copy of proposed upstream patch for Puppet CVE-2011-3872 issue against the v2.7.5 branch (319.55 KB, patch)
2011-10-24 13:51 UTC, Jan Lieskovsky
no flags Details | Diff
Local copy of proposed upstream patch for Puppet CVE-2011-3872 issue against the v0.24 branch (3.29 KB, patch)
2011-10-24 14:00 UTC, Jan Lieskovsky
no flags Details | Diff

Description Jan Lieskovsky 2011-10-24 13:44:53 UTC
A security flaw was found in the way Puppet, a network tool for managing many disparate systems, recognized additional DNS names to be added to the certificate of the Puppet master, when that certicate was used for subsequent communication with Puppet clients. A remote, privileged user, with ability to modify the SSL certificate of the Puppet agent could use this flaw to impersonate main Puppet master server against Puppet clients (MITM).

Comment 1 Jan Lieskovsky 2011-10-24 13:46:46 UTC
This issue affects the versions of the puppet package, as shipped with Fedora release of 14 and 15.

--

This issue affects the versions of the puppet package, as shipped with Fedora EPEL 4, Fedora EPEL 5 and Fedora EPEL 6 releases.

Comment 3 Jan Lieskovsky 2011-10-24 13:51:42 UTC
Created attachment 529872 [details]
Local copy of proposed upstream patch for Puppet CVE-2011-3872 issue against the v2.7.5 branch

Comment 4 Jan Lieskovsky 2011-10-24 14:00:33 UTC
Created attachment 529874 [details]
Local copy of proposed upstream patch for Puppet CVE-2011-3872 issue against the v0.24 branch


Removes the certdnsnames option all together.

Comment 5 Jan Lieskovsky 2011-10-24 14:01:44 UTC
This issue affects the versions of the puppet package, as shipped with Red Hat
Enterprise MRG 1.3.

Comment 7 Vincent Danen 2011-10-25 01:39:46 UTC
This issue is now public.

External Reference:

http://www.puppetlabs.com/security/cve/cve-2011-3872/

Comment 9 Peter Robinson 2011-11-29 14:39:49 UTC
Closing as puppet 2.6.12 has been pushed to stable as an update for EPEL 4,5,6 and Fedora 14,15,16 and rawhide.

Comment 10 Kurt Seifried 2012-02-15 17:07:10 UTC
This issue also affects CloudForms

Comment 13 Kurt Seifried 2012-03-10 00:49:48 UTC
Created puppet tracking bugs for this issue

Affects: fedora-all [bug 801972]

Comment 14 Todd Zullinger 2012-03-10 02:53:07 UTC
I'm a bit confused (nothing new there).  This issue was fixed in puppet 2.6.12 which has been in all fedora releases for a while now.  As a puppet maintainer for fedora/epel, is there something that further that I need to do?

Comment 15 Kurt Seifried 2012-04-11 16:18:36 UTC
Resolved in Puppet 2.7.6 and 2.6.12, CloudForms ships Puppet 2.6.14.


Note You need to log in before you can comment on or make changes to this bug.