<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for puppet</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-RU-2015:0696-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2014-06-30T15:48:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2014-06-30T15:48:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2014-06-30T15:48:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for puppet</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
Puppet was updated to fix the following security issues:

    * Unsafe use of temporary files. (CVE-2013-4969)
    * Arbitrary code execution with required social engineering.
      (CVE-2014-3248, CVE-2014-3250)

Security Issues references:

    * CVE-2014-3248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248&gt;
    * CVE-2013-4969
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969&gt;
    * CVE-2014-3250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250&gt;

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sledsp3-puppet,slessp3-puppet</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement//suse-ru-20150696-1/</URL>
      <Description>Link for SUSE-RU-2015:0696-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2015-April/002875.html</URL>
      <Description>E-Mail link for SUSE-RU-2015:0696-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/825878</URL>
      <Description>SUSE Bug 825878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/835122</URL>
      <Description>SUSE Bug 835122</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/835848</URL>
      <Description>SUSE Bug 835848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/835891</URL>
      <Description>SUSE Bug 835891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/853982</URL>
      <Description>SUSE Bug 853982</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/856843</URL>
      <Description>SUSE Bug 856843</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864082</URL>
      <Description>SUSE Bug 864082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/879913</URL>
      <Description>SUSE Bug 879913</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/913078</URL>
      <Description>SUSE Bug 913078</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3567/</URL>
      <Description>SUSE CVE CVE-2013-3567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4761/</URL>
      <Description>SUSE CVE CVE-2013-4761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4969/</URL>
      <Description>SUSE CVE CVE-2013-4969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3248/</URL>
      <Description>SUSE CVE CVE-2014-3248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3250/</URL>
      <Description>SUSE CVE CVE-2014-3250 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3" CPE="cpe:/o:suse:suse_sled:11:sp3">SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3">SUSE Linux Enterprise Server 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3" CPE="cpe:/o:suse:sles_sap:11:sp3">SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="puppet-2.6.18-0.16.1">
      <FullProductName ProductID="puppet-2.6.18-0.16.1">puppet-2.6.18-0.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="puppet-server-2.6.18-0.16.1">
      <FullProductName ProductID="puppet-server-2.6.18-0.16.1">puppet-server-2.6.18-0.16.1</FullProductName>
    </Branch>
    <Relationship ProductReference="puppet-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:puppet-2.6.18-0.16.1">puppet-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="puppet-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:puppet-2.6.18-0.16.1">puppet-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="puppet-server-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:puppet-server-2.6.18-0.16.1">puppet-server-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="puppet-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-2.6.18-0.16.1">puppet-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="puppet-server-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-server-2.6.18-0.16.1">puppet-server-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="puppet-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-2.6.18-0.16.1">puppet-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="puppet-server-2.6.18-0.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-server-2.6.18-0.16.1">puppet-server-2.6.18-0.16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.</Note>
    </Notes>
    <CVE>CVE-2013-3567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement//suse-ru-20150696-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3567.html</URL>
        <Description>CVE-2013-3567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040151</URL>
        <Description>SUSE Bug 1040151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/825878</URL>
        <Description>SUSE Bug 825878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880224</URL>
        <Description>SUSE Bug 880224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service.  NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.</Note>
    </Notes>
    <CVE>CVE-2013-4761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement//suse-ru-20150696-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4761.html</URL>
        <Description>CVE-2013-4761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/835122</URL>
        <Description>SUSE Bug 835122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836962</URL>
        <Description>SUSE Bug 836962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880224</URL>
        <Description>SUSE Bug 880224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.</Note>
    </Notes>
    <CVE>CVE-2013-4969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement//suse-ru-20150696-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4969.html</URL>
        <Description>CVE-2013-4969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856843</URL>
        <Description>SUSE Bug 856843</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.</Note>
    </Notes>
    <CVE>CVE-2014-3248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement//suse-ru-20150696-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3248.html</URL>
        <Description>CVE-2014-3248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879913</URL>
        <Description>SUSE Bug 879913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.</Note>
    </Notes>
    <CVE>CVE-2014-3250</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-2.6.18-0.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:puppet-server-2.6.18-0.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement//suse-ru-20150696-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3250.html</URL>
        <Description>CVE-2014-3250</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879913</URL>
        <Description>SUSE Bug 879913</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
