CVE-2011-3872

EUVD-2011-3826
Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
puppetpuppet
2.6.0
puppetpuppet
2.6.1
puppetpuppet
2.6.2
puppetpuppet
2.6.3
puppetpuppet
2.6.4
puppetpuppet
2.6.5
puppetpuppet
2.6.6
puppetpuppet
2.6.7
puppetpuppet
2.6.8
puppetpuppet
2.6.9
puppetpuppet
2.6.10
puppetpuppet
2.6.11
puppetpuppet
2.7.2
puppetpuppet
2.7.3
puppetpuppet
2.7.4
puppetpuppet
2.7.5
puppetlabspuppet
2.7.0
puppetlabspuppet
2.7.1
puppetpuppet_enterprise
1.2.0
puppetpuppet_enterprise
1.2.1
puppetpuppet_enterprise
1.2.2
puppetpuppet_enterprise
1.2.3
puppetlabspuppet_enterprise_users
1.0
puppetlabspuppet_enterprise_users
1.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puppet
bullseye
5.5.22-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puppet
hardy
ignored
lucid
Fixed 0.25.4-2ubuntu6.5
released
maverick
Fixed 2.6.1-0ubuntu2.4
released
natty
Fixed 2.6.4-2ubuntu2.5
released
oneiric
Fixed 2.7.1-1ubuntu3.2
released