ALT-PU-2013-1179-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-4435
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
Modified: 2024-11-21
CVE-2013-4436
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
Modified: 2024-11-21
CVE-2013-4437
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
Modified: 2024-11-21
CVE-2013-4438
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
Modified: 2024-11-21
CVE-2013-4439
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.
- http://docs.saltstack.com/topics/releases/0.17.1.html
- http://docs.saltstack.com/topics/releases/0.17.1.html
- [oss-security] 20131018 Re: CVE request for saltstack minion identity usurpation
- [oss-security] 20131018 Re: CVE request for saltstack minion identity usurpation
- https://github.com/saltstack/salt/pull/7356
- https://github.com/saltstack/salt/pull/7356
Modified: 2024-11-21
CVE-2013-6617
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.