CVE-2012-1987

Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html Broken Link
http://projects.puppetlabs.com/issues/13552 Broken Link Vendor Advisory
http://projects.puppetlabs.com/issues/13553 Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 Broken Link
http://puppetlabs.com/security/cve/cve-2012-1987/ Broken Link Vendor Advisory
http://puppetlabs.com/security/cve/cve-2012-1987/hotfixes/ Broken Link Vendor Advisory
http://secunia.com/advisories/48743 Broken Link Vendor Advisory
http://secunia.com/advisories/48748 Broken Link Vendor Advisory
http://secunia.com/advisories/48789 Broken Link Vendor Advisory
http://secunia.com/advisories/49136 Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2451 Mailing List Third Party Advisory
http://www.osvdb.org/81308 Broken Link
http://www.securityfocus.com/bid/52975 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/74794 Third Party Advisory
https://hermes.opensuse.org/messages/14523305 Broken Link
https://hermes.opensuse.org/messages/15087408 Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html Broken Link
http://projects.puppetlabs.com/issues/13552 Broken Link Vendor Advisory
http://projects.puppetlabs.com/issues/13553 Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 Broken Link
http://puppetlabs.com/security/cve/cve-2012-1987/ Broken Link Vendor Advisory
http://puppetlabs.com/security/cve/cve-2012-1987/hotfixes/ Broken Link Vendor Advisory
http://secunia.com/advisories/48743 Broken Link Vendor Advisory
http://secunia.com/advisories/48748 Broken Link Vendor Advisory
http://secunia.com/advisories/48789 Broken Link Vendor Advisory
http://secunia.com/advisories/49136 Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2451 Mailing List Third Party Advisory
http://www.osvdb.org/81308 Broken Link
http://www.securityfocus.com/bid/52975 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/74794 Third Party Advisory
https://hermes.opensuse.org/messages/14523305 Broken Link
https://hermes.opensuse.org/messages/15087408 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-05-29 20:55

Updated : 2025-11-20 18:53


NVD link : CVE-2012-1987

Mitre link : CVE-2012-1987

CVE.ORG link : CVE-2012-1987


JSON object : View

Products Affected

puppet

  • puppet_enterprise
  • puppet