{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2013-1654","title":"Title"},{"category":"description","text":"Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2013-1654","url":"https://www.suse.com/security/cve/CVE-2013-1654"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 809839 for CVE-2013-1654","url":"https://bugzilla.suse.com/809839"},{"category":"external","summary":"SUSE Bug 880224 for CVE-2013-1654","url":"https://bugzilla.suse.com/880224"},{"category":"external","summary":"Advisory link for SUSE-SU-2013:0618-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2013-April/000414.html"}],"title":"SUSE CVE CVE-2013-1654","tracking":{"current_release_date":"2025-04-25T12:30:40Z","generator":{"date":"2023-02-15T05:40:36Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2013-1654","initial_release_date":"2023-02-15T05:40:36Z","revision_history":[{"date":"2023-02-15T05:40:36Z","number":"2","summary":"Current version"},{"date":"2023-12-08T04:58:02Z","number":"3","summary":"Current version"},{"date":"2025-03-14T07:16:03Z","number":"4","summary":"Current version"},{"date":"2025-03-16T13:22:16Z","number":"5","summary":"Current version"},{"date":"2025-04-25T12:30:40Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Desktop 11 SP2","product":{"name":"SUSE Linux Enterprise Desktop 11 SP2","product_id":"SUSE Linux Enterprise Desktop 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sled:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP2","product":{"name":"SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp2"}}},{"category":"product_version","name":"puppet","product":{"name":"puppet","product_id":"puppet","product_identification_helper":{"cpe":"cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/puppet@?upstream=puppet.src.rpm"}}},{"category":"product_version","name":"puppet-2.6.18-0.4.2","product":{"name":"puppet-2.6.18-0.4.2","product_id":"puppet-2.6.18-0.4.2","product_identification_helper":{"cpe":"cpe:2.3:a:puppet:puppet:2.6.18:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/puppet@2.6.18-0.4.2?upstream=puppet-2.6.18-0.4.2.src.rpm"}}},{"category":"product_version","name":"puppet-server-2.6.18-0.4.2","product":{"name":"puppet-server-2.6.18-0.4.2","product_id":"puppet-server-2.6.18-0.4.2","product_identification_helper":{"cpe":"cpe:2.3:a:puppet:puppet:2.6.18:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/puppet-server@2.6.18-0.4.2?upstream=puppet-2.6.18-0.4.2.src.rpm"}}},{"category":"product_version","name":"pwdutils-3.2.8-0.2.35","product":{"name":"pwdutils-3.2.8-0.2.35","product_id":"pwdutils-3.2.8-0.2.35","product_identification_helper":{"purl":"pkg:rpm/suse/pwdutils@3.2.8-0.2.35?upstream=pwdutils-3.2.8-0.2.35.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Desktop 11 SP2","product_id":"SUSE Linux Enterprise Desktop 11 SP2:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"puppet-server-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-server-2.6.18-0.4.2"},"product_reference":"puppet-server-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"pwdutils-3.2.8-0.2.35 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:pwdutils-3.2.8-0.2.35"},"product_reference":"pwdutils-3.2.8-0.2.35","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-server-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2:puppet-server-2.6.18-0.4.2"},"product_reference":"puppet-server-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-server-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-server-2.6.18-0.4.2"},"product_reference":"puppet-server-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet as component of SUSE Linux Enterprise Server 11 SP1 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP1 for Teradata:puppet"},"product_reference":"puppet","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1 for Teradata"},{"category":"default_component_of","full_product_name":{"name":"puppet as component of SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata:puppet"},"product_reference":"puppet","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3 for Teradata"}]},"vulnerabilities":[{"cve":"CVE-2013-1654","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-1654"}],"notes":[{"category":"general","text":"Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.","title":"CVE description"}],"product_status":{"known_affected":["SUSE Linux Enterprise Server 11 SP1 for Teradata:puppet","SUSE Linux Enterprise Server 11 SP3 for Teradata:puppet"],"recommended":["SUSE Linux Enterprise Desktop 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:pwdutils-3.2.8-0.2.35","SUSE Linux Enterprise Server 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP2:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-server-2.6.18-0.4.2"]},"references":[{"category":"external","summary":"CVE-2013-1654","url":"https://www.suse.com/security/cve/CVE-2013-1654"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 809839 for CVE-2013-1654","url":"https://bugzilla.suse.com/809839"},{"category":"external","summary":"SUSE Bug 880224 for CVE-2013-1654","url":"https://bugzilla.suse.com/880224"},{"category":"external","summary":"Advisory link for SUSE-SU-2013:0618-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2013-April/000414.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:pwdutils-3.2.8-0.2.35","SUSE Linux Enterprise Server 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP2:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-server-2.6.18-0.4.2"]}],"threats":[{"category":"impact","date":"2013-06-28T06:59:49Z","details":"moderate"}],"title":"CVE-2013-1654"}]}