CVE-2017-2295

Impact:
Important
Public Date:
2017-05-11
CWE:
CWE-502
Bugzilla:
1452651: CVE-2017-2295 puppet: Unsafe YAML deserialization

The MITRE CVE dictionary describes this issue as:

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

Find out more about CVE-2017-2295 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 8.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Satellite 6.3 RHSA-2018:0336 2018-02-21
Red Hat Satellite Capsule 6.3 RHSA-2018:0336 2018-02-21

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 puppet Will not fix
Red Hat Satellite 6 puppet Affected
Red Hat OpenStack Platform 9.0 puppet Will not fix
Red Hat OpenStack Platform 8.0 (Liberty) puppet Will not fix
Red Hat OpenStack Platform 12.0 puppet Will not fix
Red Hat OpenStack Platform 11.0 (Ocata) puppet Will not fix
Red Hat OpenStack Platform 10 puppet Will not fix
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 puppet Will not fix
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 puppet Will not fix
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) puppet Will not fix
Red Hat Ceph Storage 1.3 puppet Will not fix
OpenStack 6 Installer for RHEL 7 puppet Will not fix

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.