Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0076 A number of vulnerabilities have been identified in Tenable SecurityCenter 27 July 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tenable SecurityCenter Operating System: Linux variants VMware ESX Server Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-4150 CVE-2015-4149 Member content until: Wednesday, August 26 2015 OVERVIEW A number of vulnerabilities have been identified in Tenable SecurityCenter prior to version 5.0.0.1. [1] IMPACT The vendor has provided the following details regarding these issues: CVE-2015-4149, CVE-2015-4150: "SecurityCenter contains multiple flaws that may allow an authenticated user to execute remote commands on the device. The issue is due to four separate pages not fully sanitizing user-supplied files during upload functions, allowing for the injection of operating system commands. In each case the user must be authenticated to the device, and in two cases the account must have sufficient privileges to reach the vulnerable functionality. Three of the issues were reported by Vincent Hutsebaut and are covered by CVE-2015-4149. After receiving the report, Tenable audited additional functionality for the same issue and found one internally, which is covered by CVE-2015-4150 due to their wonky abstraction rules." [1] MITIGATION It is recommended that users upgrade to the latest version of Tenable SecurityCenter or obtain the relevant patch to correct these issues. [1] REFERENCES [1] [R1] Tenable SecurityCenter Post-authentication Remote Command Execution http://www.tenable.com/security/tns-2015-10 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVbWxHX6ZAP0PgtI9AQIC3hAAkhd28K6atrMR7KiucRPyqOb7yrOjPwNi bc1yw4XJzmB9MXzh+qsxYMMeIB1Ij8la5oS/NqgQvtLbFe1fsglbcBYcobo1OTZs glTkshyNHnqaAOy7IzCdz9/V0Q5WHs5nmIlCDRxK7k4ZQvd1aNy/glQ2tWMdUeFj nAg4MNl5u02kgDsqzBXx2lN3UtwJxRunBfBV9Cj0UFn8LKk22vhNNU9Fb9f14cqy sxwz9xYL5xheydJU39QfUn6LLAEZWLgSOV1Rsw3kXebf8+Z2h/qIusdtdLpNT83V cDqysTuMjBZmPOuV/w4ziChj/lSobyI9GwyegpJceScSr5kqXrGj0eTEodjG/SDW Pmq+YwEpFLh7Jrdi7hWbfeR17ts02UxfRyCagXynMh/onAZjYngL/0MfK0sfVNec MVB8GaJx1GiT00v6XHefRiEavV8FX+VfS+T+U2N+K3VqvddvNHA2Jb9X1jIoQasJ tBSTKnX3oNLxeFYYIiHEfkCqd5W+2dshdCOkZO9Rdd7UOddLfLJmm0OQOARMQwyN NEOp4L/AU3ZFv1tGefhi6p/I6xuH7ja2WOhJqKIbH9vgbw4COvhH3+kgxbqUzRr+ QwK9lN0ehI7YqZd9WxQouM54GYU4R19m5JR0HLGJHf+I2w1Lt84g+uj3b7XRxS8X iMQHUjGAN68= =DPjy -----END PGP SIGNATURE-----