FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

salt -- multiple vulnerabilities

Affected packages
py27-salt < 2016.11.8
2017.7.0 <= py27-salt < 2017.7.2
py32-salt < 2016.11.8
2017.7.0 <= py32-salt < 2017.7.2
py33-salt < 2016.11.8
2017.7.0 <= py33-salt < 2017.7.2
py34-salt < 2016.11.8
2017.7.0 <= py34-salt < 2017.7.2
py35-salt < 2016.11.8
2017.7.0 <= py35-salt < 2017.7.2
py36-salt < 2016.11.8
2017.7.0 <= py36-salt < 2017.7.2

Details

VuXML ID 50127e44-7b88-4ade-8e12-5d57320823f1
Discovery 2017-10-09
Entry 2017-11-23

SaltStack reports:

Directory traversal vulnerability in minion id validation in SaltStack. Allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net). NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.

Remote Denial of Service with a specially crafted authentication request. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net)

References

CVE Name CVE-2017-14695
CVE Name CVE-2017-14696
URL https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.8.html
URL https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html
URL https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b
URL https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d