Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R5] OpenSSL '20150709' Advisory Affects Tenable Products

Medium

Synopsis

SecurityCenter and PVS are potentially impacted by a vulnerability in OpenSSL that was recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time.

OpenSSL crypto/x509/x509_vfy.c X509_verify_cert() Function Alternative Certificate Chain Handling Certificate Validation Bypass

OpenSSL contains a flaw in the X509_verify_cert() function in crypto/x509/x509_vfy.c that is triggered when locating alternate certificate chains in cases where the first attempt to build such a chain fails. This may allow a remote attacker to cause certain certificate checks to be bypassed, leading to an invalid presented certificate being considered as valid.

Please note that Tenable strongly recommends that SecurityCenter and PVS be installed on a subnet that is not Internet addressable.

Solution

SecurityCenter:

Tenable has released a patch for SecurityCenter 4.6.2.2, 4.7.1, and 4.8.2 that addresses this vulnerability. This patch applies OpenSSL 1.0.1p, which is not affected. Upgrade information can be obtained from:

http://static.tenable.com/prod_docs/upgrade_security_center.html

The patch can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=160

File	   		      md5sum
SC-201507.2-4.x-rh5-32.tgz  1b36f27ede9f2456a5273b399890fae4
SC-201507.2-4.x-rh5-64.tgz  a01f077117b133a815b228e83676d7bc
SC-201507.2-4.x-rh6-32.tgz  9dea9ee20af9640c3a920907cae374d2
SC-201507.2-4.x-rh6-64.tgz  ba5e56b23b701a3df8307ccd23547f43

Users of SecurityCenter 5.0.0.1 are not affected by this issue, as it was introduced in OpenSSL 1.0.1n and 5.0.0.1 uses 1.0.1m.

PVS:

Tenable has released version 4.4.0 that corresponds to the supported operating systems and architectures. This version bundles the updated OpenSSL library (1.0.2d), which is not affected. Upgrade information can be found at:

http://static.tenable.com/prod_docs/upgrade_pvs.html

The updated version of PVS can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=170

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2015-1793
Tenable Advisory ID: TNS-2015-08
Risk Factor: Medium
CVSSv2 Base / Temporal Score
4.0 / 3.0
CVSSv2 Vector:
(AV:N/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)

Affected Products

SecurityCenter: 4.6.2.2, 4.7.0, 4.7.1, 4.8, 4.8.1
PVS: 4.3.0

Disclosure Timeline

2015-07-09 - Disclosure, OpenSSL upgrade available
2015-07-20 - Tenable SC patch available
2015-09-08 - PVS 4.4.0 release

Advisory Timeline

2015-07-20 - [R1] Initial release
2016-02-16 - [R2] PVS information added
2016-03-03 - [R3] Title standardization
2016-11-16 - [R4] Adjusted CVSSv2 score
2017-02-28 - [R5] Title standardization, adjust CVSS for worst-case scenario (AV:A -> AV:N)