Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R7] Tenable Appliance Affected by GNU bash 'Shellshock' Vulnerability

Critical

Synopsis

GNU bash contains a flaw that is triggered when evaluating environment variables passed from another environment. After processing a function definition, bash continues to process trailing strings. Via certain applications, a local or remote attacker may inject shell commands, allowing local privilege escalation or remote command execution depending on the application vector.

The Tenable Appliance has been determined to be affected via the DHCP client that is run when configured to use DHCP for network configuration information on any interface. Additionally, it has been confirmed that the simpleupload.html page is vulnerable through the web server. The vulnerable simpleupload.html page is available without authentication beginning with the 2.6.2 version.

Solution

Tenable has released a patch script for all supported versions of the Appliance that addresses this vulnerability. This patch has been tested on Tenable Appliance 2.4.0-0, 2.4.1-0, 2.4.1-1, 2.4.1-2, 2.6.1, 2.6.2, 2.8.0, and 2.8.1.

The patch can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=230

File                       md5sum
CVE-2014-7169.tar.gz                ed0d79e9232f5584d58a6dfd9fb5cff6

Tenable has released version 3.0.0 of the appliance which also resolves this issue.

File                                        md5sum                                    SHA1 sum
TenableAppliance-3.0.0-64-update.tar        3830a586afa9f0fb4c70f1cfb119f839          2384da2a29ec860782c3cfd168334ed19b59bf4a
TenableAppliance-HyperV-3.0.0-64bit.zip     86911ed30f657b5ea5d19b529bae0610          3fb28fbafa611e2279e2d5f1b894de770c088453
TenableAppliance-VMware-3.0.0-64bit.ova     5fbb61a26a39b89e2024fe617a8e8d99          2f5bbf2d694d56f880bae328d58ca81c5c48a13a

Note that versions 1.x.x of the Appliance are not supported. Users should update to the latest release.

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TNS-2014-07
Risk Factor: Critical
Credit:
Stephane Chazelas (original discovery of issue)
CVSSv2 Base / Temporal Score
10.0 / 9.5
CVSSv2 Vector:
(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:W/RC:C)
Additional Keywords:
Shellshock, bashHOLE, After Shock

Affected Products

Tenable Appliance: 1.0.4-x, 2.0.x, 2.2.x, 2.4.x, 2.6.x, 2.8.0, 2.8.1

Disclosure Timeline

2014-09-24 - Issue Disclosed
2014-09-24 - Exploit Published
2014-09-24 - Vendor Solution (incomplete, still vulnerable)
2014-09-26 - Tenable Solution

Advisory Timeline

2014-09-25 - [R1] Initial release
2014-09-25 - [R2] Patch Information Added
2014-09-29 - [R3] Update affected, update description, update solution
2014-10-01 - [R4] Added CVE IDs, update description, update solution
2014-11-05 - [R5] Update solution with Appliance 3.0.0 info
2016-11-17 - [R6] Adjusted CVSSv2 score
2017-02-28 - [R7] Title standardization, adjust CVSS for worst-case scenario (AV:A -> AV:N)