{ "id": "CVE-2009-3564", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-06T17:30:00.217", "lastModified": "2017-12-09T02:29:00.297", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "puppetmasterd in puppet 0.24.6 does not reset supplementary groups when it switches to a different user, which might allow local users to access restricted files." }, { "lang": "es", "value": "puppetmasterd en puppet v0.24.6 no borra los grupos adicionales cuando cambia a otro usuario, lo que permite a usuarios locales acceder a ficheros restringidos." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-3564\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update for Red Hat Enterprise MRG may address this flaw.", "lastModified": "2009-10-08T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:reductivelabs:puppet:0.24.6:*:*:*:*:*:*:*", "matchCriteriaId": "B151012D-7B18-4D3F-A342-AB1198158A48" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:o:centos:centos:*:*:*:*:*:*:*:*", "matchCriteriaId": "C503778F-1720-407F-BF38-73A9D9A78750" }, { "vulnerable": false, "criteria": "cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*", "matchCriteriaId": "20294CE7-12C8-43CA-A702-5ED2A3044FFC" } ] } ] } ], "references": [ { "url": "http://projects.reductivelabs.com/issues/1806", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=475201", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://puppet.com/security/cve/cve-2009-3564", "source": "cve@mitre.org" } ] }