Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R7] OpenSSL '20150611' Advisory Affects Tenable Products

High

Synopsis

Nessus and SecurityCenter are potentially impacted by several vulnerabilities in OpenSSL that were recently disclosed and fixed. Note that due to the time involved in doing a full analysis of each issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time.

  • CVE-2015-1788 - OpenSSL crypto/bn/bn_gf2m.c BN_GF2m_mod_inv() Function ECParameters Structure Binary Polynomial Field Parsing Infinite Loop Remote DoS
  • CVE-2015-1789 - OpenSSL crypto/x509/x509_vfy.c X509_cmp_time() Function ASN1_TIME String Handling Out-of-bounds Read Issue
  • CVE-2015-1790 - OpenSSL crypto/pkcs7/pk7_doit.c PKCS7_dataDecode() Function ASN.1-encoded PKCS#7 Blob Handling NULL Pointer Dereference Remote DoS
  • CVE-2015-1792 - OpenSSL signedData Message Unknown Hash Function Processing Infinte Loop Remote DoS
  • CVE-2014-8176 - OpenSSL DTLS Application Data Buffering Invalid Free Remote Memory Corruption

Upon further inspection, Nessus is not affected by CVE-2015-1790, CVE-2015-1792, and CVE-2014-8176. Note that the CVSS score in this advisory reflects the highest risk of the issues included.

Please note that Tenable strongly recommends that Nessus and SecurityCenter be installed on a subnet that is not Internet addressable.

Solution

Nessus

Tenable has released versions 5.2.12 and 6.4 that correspond to the supported operating systems and architectures. This version bundles the updated OpenSSL library (1.0.0s or 1.0.1n), which is not affected.

To update your Nessus installation, follow these steps:

SecurityCenter

Tenable has released patches for supported versions of SecurityCenter. This version integrates an updated OpenSSL library (1.0.1o) that fixes the issues listed above. The patch can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=160

File                    md5sum
SC-201506.2-rh5-32.tgz  f5ae7d8d02dc7211a82cb727918baae6 
SC-201506.2-rh5-64.tgz  292726fb9abbae19428821c29530737b 
SC-201506.2-rh6-32.tgz  d2297a7b948c943f43c5f05f13038198 
SC-201506.2-rh6-64.tgz  b43a116c22e3107f3cc94afb6396f07a  

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TNS-2015-07
Risk Factor: High
CVSSv2 Base / Temporal Score
8.5 / 6.3
CVSSv2 Vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:C/E:U/RL:OF/RC:C)

Affected Products

Nessus: 5.2.0, 5.2.10, 6.0, 6.3.7
Nessus Agents: 6.3, 6.3.7
Security Center: 4.6.2.2, 4.7.0, 4.7.1, 4.8.0, 4.8.1, 4.8.2, 5.0.0.1

Disclosure Timeline

2015-06-11 - OpenSSL Upgrade Available
2015-06-30 - Tenable Nessus Upgrade Available

Advisory Timeline

2015-06-30 - [R1] Initial release
2015-07-07 - [R2] Clarified products
2015-07-14 - [R3] SecurityCenter information added
2015-11-20 - [R4] Note that Nessus is not impacted by 3 of the CVE
2016-03-03 - [R5] Title standardization
2016-11-16 - [R6] Adjusted CVSSv2 score
2017-02-28 - [R7] Adjust CVSS for worst-case scenario (AV:A -> AV:N)