CVE-2012-1987

N/A Unknown
Published: May 29, 2012 Modified: November 20, 2025

Description

Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://projects.puppetlabs.com/issues/13552
Source: cve@mitre.org
Broken Link Vendor Advisory
http://projects.puppetlabs.com/issues/13553
Source: cve@mitre.org
Broken Link Vendor Advisory
http://puppetlabs.com/security/cve/cve-2012-1987/
Source: cve@mitre.org
Broken Link Vendor Advisory
http://puppetlabs.com/security/cve/cve-2012-1987/hotfixes/
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/48743
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/48748
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/48789
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/49136
Source: cve@mitre.org
Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2012/dsa-2451
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.osvdb.org/81308
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/bid/52975
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/74794
Source: cve@mitre.org
Third Party Advisory
https://hermes.opensuse.org/messages/14523305
Source: cve@mitre.org
Broken Link
https://hermes.opensuse.org/messages/15087408
Source: cve@mitre.org
Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://projects.puppetlabs.com/issues/13552
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://projects.puppetlabs.com/issues/13553
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://puppetlabs.com/security/cve/cve-2012-1987/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://puppetlabs.com/security/cve/cve-2012-1987/hotfixes/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/48743
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/48748
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/48789
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/49136
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2012/dsa-2451
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.osvdb.org/81308
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/52975
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/74794
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://hermes.opensuse.org/messages/14523305
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://hermes.opensuse.org/messages/15087408
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.8%
73th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

puppet