USN-2013-1: MAAS vulnerabilities

Publication date

7 November 2013

Overview

MAAS could be made to run programs as an administrator.


Packages

  • maas - Ubuntu MAAS Server

Details

It was discovered that maas-import-pxe-files incorrectly loaded
configuration information from the current working directory. A local
attacker could execute code as an administrator if maas-import-pxe-files
were run from an attacker-controlled directory. (CVE-2013-1057)

It was discovered that maas-import-pxe-files doesn’t cryptographically
verify downloaded content. An attacker could modify images without
detection. (CVE-2013-1058)

It was discovered that maas-import-pxe-files incorrectly loaded
configuration information from the current working directory. A local
attacker could execute code as an administrator if maas-import-pxe-files
were run from an attacker-controlled directory. (CVE-2013-1057)

It was discovered that maas-import-pxe-files doesn’t cryptographically
verify downloaded content. An attacker could modify images without
detection. (CVE-2013-1058)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:


Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›