-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0209
       [R1]Nessus 6.11.3 Fixes Multiple Third-party Vulnerabilities
                              8 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Tenable Nessus
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Provide Misleading Information -- Remote/Unauthenticated
                      Access Confidential Data       -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-3735 CVE-2017-3736 
Member content until: Sunday, January  7 2018
Reference:            ASB-2017.0202
                      ESB-2017.3132
                      ESB-2017.3120
                      ESB-2017.3100

OVERVIEW

        Tenable has identified a number of vulnerabilities in Tenable Nessus 
        and Nessus Enterprise prior to version 6.11.3. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "Risk Information
        
        CVE ID: CVE-2017-3735, CVE-2017-3736 
        
        • OpenSSL Security Bypass Vulnerability (CVE-2017-3735)
        
        • OpenSSL Information Disclosure Vulnerability (CVE-2017-3736)
        
        Tenable Advisory ID: TNS-2017-15
        
        Risk Factor: Medium
        
        CVSSv2 Base / Temporal Score: 5.0/3.9
        
        CVSSv2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C
        
        Affected Products
        Nessus 6.x to 6.11.2" [1]   


MITIGATION

        The vendor advises users should upgrade to the latest 
        version of Tenable Nessus and Nessus Enterprise to resolve these 
        issues. [1]


REFERENCES

        [1] [R1]Nessus 6.11.3 Fixes Multiple Third-party Vulnerabilities
            https://www.tenable.com/security/tns-2017-15

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWioWJ4x+lLeg9Ub1AQgUVA/+K0PVABd3qLML0jVGCslZoJWVug4tlXJx
a3xZ0j7mMlT9fQQrIA8k9WSBt4quHzZcI9zPAxO0hO/PcTbmcMQCkIV1wCuRSz+C
x5LZ9OfMY9xMl3rKWCZ9EmvWN1+sHwvrsn9XZxXMpC+Ar8oM2mgV5zJ0PlRYz8gW
vitIPnqhM+a1cf2BPzmze5L8yiA5Uzh6g59Na4FrjKV0NoTIu8OwM74fKMLcce5E
g10aXl1a8V5QY/muQkt+yQNL/F37v43KJXpaP3s3n4HdNIZQJcsz53jSmDz/x6Gg
M8FmOEyIcapP2gf7o1uMPt74JUlHBDntwVOFL0l/mt3djdHobn1sqCq2mM91MAC7
gR9kUHLgJ9hJmcY/0G1XsstGtHDgn8caskhzpEl/1RWOJLl1T32lM/9nrVgaFIlu
OXQ1cjlbpmyemGrJZ0GVsD7cntH2q7h0MZFgltxKB1MAFqwrdnDYns3QbCbW4RfY
8A3yycR4aw/LMUVzT6axMoVx85SXAouH1zM3vOA0XJ0PtQXBxIkvuRi/LZ8J8Rzl
FdUpiJOw0Ajp7Qv29/ZU1alogXUa0ZejCvTkYSs2rJCgDkZJ81BGB0yfoNczNxDi
Y1v2zSF3O5jsBm51PNdtLbuXDbdCeW661qt8kKEpPMttDQI2uQ8yJtIUmbG/s6Mr
kuWetXRbCnY=
=RSqb
-----END PGP SIGNATURE-----