Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2025, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:* |
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:* |
| References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Broken Link | |
| References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Broken Link | |
| References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Broken Link | |
| References | () http://projects.puppetlabs.com/issues/13552 - Vendor Advisory, Broken Link | |
| References | () http://projects.puppetlabs.com/issues/13553 - Vendor Advisory, Broken Link | |
| References | () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link | |
| References | () http://puppetlabs.com/security/cve/cve-2012-1987/ - Vendor Advisory, Broken Link | |
| References | () http://puppetlabs.com/security/cve/cve-2012-1987/hotfixes/ - Broken Link, Vendor Advisory | |
| References | () http://secunia.com/advisories/48743 - Vendor Advisory, Broken Link | |
| References | () http://secunia.com/advisories/48748 - Vendor Advisory, Broken Link | |
| References | () http://secunia.com/advisories/48789 - Vendor Advisory, Broken Link | |
| References | () http://secunia.com/advisories/49136 - Vendor Advisory, Broken Link | |
| References | () http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory | |
| References | () http://www.debian.org/security/2012/dsa-2451 - Mailing List, Third Party Advisory | |
| References | () http://www.osvdb.org/81308 - Broken Link | |
| References | () http://www.securityfocus.com/bid/52975 - Broken Link | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/74794 - Third Party Advisory | |
| References | () https://hermes.opensuse.org/messages/14523305 - Broken Link | |
| References | () https://hermes.opensuse.org/messages/15087408 - Broken Link |
Information
Published : 2012-05-29 20:55
Updated : 2025-11-20 18:53
NVD link : CVE-2012-1987
Mitre link : CVE-2012-1987
CVE.ORG link : CVE-2012-1987
JSON object : View
Products Affected
puppet
- puppet
- puppet_enterprise
CWE
