CVE-2012-1053
Summary
| CVE | CVE-2012-1053 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-05-29 20:55:07 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the change_user not dropping supplementary groups in certain conditions, (2) changes to the eguid without associated changes to the egid, or (3) the addition of the real gid to supplementary groups. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Puppet | Puppet | 2.6.0 | All | All | All |
| Application | Puppet | Puppet | 2.6.1 | All | All | All |
| Application | Puppet | Puppet | 2.6.10 | All | All | All |
| Application | Puppet | Puppet | 2.6.11 | All | All | All |
| Application | Puppet | Puppet | 2.6.12 | All | All | All |
| Application | Puppet | Puppet | 2.6.13 | All | All | All |
| Application | Puppet | Puppet | 2.6.2 | All | All | All |
| Application | Puppet | Puppet | 2.6.3 | All | All | All |
| Application | Puppet | Puppet | 2.6.4 | All | All | All |
| Application | Puppet | Puppet | 2.6.5 | All | All | All |
| Application | Puppet | Puppet | 2.6.6 | All | All | All |
| Application | Puppet | Puppet | 2.6.7 | All | All | All |
| Application | Puppet | Puppet | 2.6.8 | All | All | All |
| Application | Puppet | Puppet | 2.6.9 | All | All | All |
| Application | Puppet | Puppet | 2.7.10 | All | All | All |
| Application | Puppet | Puppet | 2.7.2 | All | All | All |
| Application | Puppet | Puppet | 2.7.3 | All | All | All |
| Application | Puppet | Puppet | 2.7.4 | All | All | All |
| Application | Puppet | Puppet | 2.7.5 | All | All | All |
| Application | Puppet | Puppet | 2.7.6 | All | All | All |
| Application | Puppet | Puppet | 2.7.7 | All | All | All |
| Application | Puppet | Puppet | 2.7.8 | All | All | All |
| Application | Puppet | Puppet | 2.7.9 | All | All | All |
| Application | Puppet | Puppet Enterprise | 1.2.0 | All | All | All |
| Application | Puppet | Puppet Enterprise | 1.2.1 | All | All | All |
| Application | Puppet | Puppet Enterprise | 1.2.2 | All | All | All |
| Application | Puppet | Puppet Enterprise | 1.2.3 | All | All | All |
| Application | Puppet | Puppet Enterprise | 1.2.4 | All | All | All |
| Application | Puppet | Puppet Enterprise | 2.0.0 | All | All | All |
| Application | Puppet | Puppet Enterprise | 2.0.1 | All | All | All |
| Application | Puppet | Puppet Enterprise | 2.0.2 | All | All | All |
| Application | Puppetlabs | Puppet | 2.7.0 | All | All | All |
| Application | Puppetlabs | Puppet | 2.7.1 | All | All | All |
| Application | Puppetlabs | Puppet Enterprise Users | 1.0 | All | All | All |
| Application | Puppetlabs | Puppet Enterprise Users | 1.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| USN-1372-1: Puppet vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | ubuntu.com | |
| Puppet Multiple Local Privilege Escalation Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Release Notes - Puppet - Puppet Labs | af854a3a-2127-422b-91ae-364da2661108 | projects.puppetlabs.com | |
| Debian -- Security Information -- DSA-2419-1 puppet | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Bug #12459: Permanent uid change doesn't drop supplementary groups - Puppet - Puppet Labs | af854a3a-2127-422b-91ae-364da2661108 | projects.puppetlabs.com | |
| Security Advisory SA48157 - Debian update for puppet - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| hermes.opensuse.org/messages/15087408 | af854a3a-2127-422b-91ae-364da2661108 | hermes.opensuse.org | |
| CVE-2012-1053 | Puppet Labs | af854a3a-2127-422b-91ae-364da2661108 | puppetlabs.com | Vendor Advisory |
| Security Advisory SA48161 - Ubuntu update for puppet - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Bug #12457: Real gid always present in supplementary groups - Puppet - Puppet Labs | af854a3a-2127-422b-91ae-364da2661108 | projects.puppetlabs.com | |
| Bug #12458: Only euid changed, not egid - Puppet - Puppet Labs | af854a3a-2127-422b-91ae-364da2661108 | projects.puppetlabs.com | |
| [security-announce] SUSE-SU-2012:0325-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Security Advisory SA48290 - SUSE update for puppet - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| www.osvdb.org/79495 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| Security Advisory SA48166 - Puppet Group Privileges Security Issue and K5login Privilege Escalation Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.