CVE-2018-6516 The advisory has been revoked - it doesn't affect any version of package puppet  (opens in a new tab)


Threat Intelligence

EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-PUPPET-605618
  • published19 Aug 2020
  • disclosed14 Jun 2018

Introduced: 14 Jun 2018

CVE-2018-6516  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream puppet package and not the puppet package as distributed by Debian.

On Windows only, with a specifically crafted configuration file an attacker could get Puppet PE client tools (aka pe-client-tools) 16.4.x prior to 16.4.6, 17.3.x prior to 17.3.6, and 18.1.x prior to 18.1.2 to load arbitrary code with privilege escalation.