Tenable has created patches to address these issues. Please see the vulnerability-specific instructions below.
SecurityCenter
For CVE-2014-0098 (Apache HTTP Server), patches are provided for SC 4.8.1, SC 4.7.1, and SC 4.6.2.2. The SecurityCenter 4.8.1 patch also fixes CVE-2014-3515 (PHP).
Customers with SecurityCenter 4.6.x and 4.7.x that wish to apply a patch for the PHP related vulnerability can upgrade to SecurityCenter 4.8.1 and apply the patch mentioned above.
Note that this patch will re-apply the patches for OpenSSL as noted in TNS-2014-02 and TNS-2014-03.
The patch can be obtained from:
https://support.tenable.com/support-center/index.php?x=&mod_id=160
Download the appropriate patch to the system hosting SecurityCenter. Files are named --.tgz. We recommend you put it in /tmp or its own folder.
Untar the patch archive: # tar zxf ./--.tgz
Run the install script: # ./install.sh
SecurityCenter 4.8.1 patches:
File md5sum
sc4.8.1-rh6-64.tgz 4ad4fb7bee4546d4c3a59b3ae3da39a6
sc4.8.1-rh6-32.tgz 7a9b66ac070bb322d9eb9127beedab57
sc4.8.1-rh5-64.tgz 003fd53de9d56568d3c29e08c93bcb90
sc4.8.1-rh5-32.tgz 639d867aee00d05f10d71c35ea5683bc
SecurityCenter 4.7.1 patches:
File md5sum
sc4.7.1-rh6-64.tgz 0c23ec8403b4f865953eb5aca6248f16
sc4.7.1-rh6-32.tgz 31e802c05658d9e363174cdaca5461ac
sc4.7.1-rh5-64.tgz d88d8e5842122da166fcb45ccda01233
sc4.7.1-rh5-32.tgz 3e9f009924e692aeae0e795c74b17a2f
SecurityCenter 4.6.2.2 patches:
File md5sum
sc4.6.2.2-rh6-64.tgz 4df5e9904c58a881fa01ca5ac6c52dde
sc4.6.2.2-rh6-32.tgz c014d0258a8af365e5cd609741ea8aab
sc4.6.2.2-rh5-64.tgz fd160d7edb47a00a015624048b941583
sc4.6.2.2-rh5-32.tgz ca22c43ca32b9bc6698c3cc2300ef8f7
Tenable Appliance
Appliance users can apply a patch that has been created for SecurityCenter 4.6.2.2, 4.7.1, or 4.8.1 running on it. When applied to an appliance running SecurityCenter 4.8.1, the vulnerabilities identified as CVE-2014-0098 (Apache HTTP Server) and CVE-2014-4049 (PHP) will be patched. When applied to an appliance running SecurityCenter 4.7.1 or SecurityCenter 4.6.2.2, the vulnerability for CVE-2014-0098 (Apache HTTP Server) will be patched.
If a user running SecurityCenter 4.6.x or 4.7.x wants to address the PHP vulnerability, they will need to upgrade to an appliance running SecurityCenter 4.8.1.
In addition, please note that this patch will re-apply the patches for OpenSSL as noted in TNS-2014-02 and TNS-2014-03 for SecurityCenter 4.6.2.2, 4.7.1, and 4.8.1.
The patch can be obtained from:
https://support.tenable.com/support-center/index.php?x=&mod_id=230
Tenable Appliance versions 2.4.1, 2.4.1-1, 2.6.0, 2.6.1, 2.6.2, and 2.8.1 require the following patch:
File md5sum
SC4-ApacheUpgrade.tar.gz 3dd17e456d34326050d501dac02d4eda
Tenable has also released version 3.0.0 of the appliance which resolves this issue.
File md5sum SHA1 sum
TenableAppliance-3.0.0-64-update.tar 3830a586afa9f0fb4c70f1cfb119f839 2384da2a29ec860782c3cfd168334ed19b59bf4a
TenableAppliance-HyperV-3.0.0-64bit.zip 86911ed30f657b5ea5d19b529bae0610 3fb28fbafa611e2279e2d5f1b894de770c088453
TenableAppliance-VMware-3.0.0-64bit.ova 5fbb61a26a39b89e2024fe617a8e8d99 2f5bbf2d694d56f880bae328d58ca81c5c48a13a