copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ASB-2016.0019 - [Win][UNIX/Linux] Tenable Nessus: Multiple vulnerabilities

Date: 04 March 2016
References: ESB-2016.0543.2  ESB-2016.0544  ESB-2016.0547  ESB-2016.0560  ESB-2016.0569  ESB-2016.0601  ESB-2016.0634  ESB-2016.0636  ESB-2016.0650  ESB-2016.0661  
ESB-2016.0689  ESB-2016.0750  ESB-2016.0756  ESB-2016.0783  ESB-2016.0943  ESB-2016.0991  ESB-2016.1119  ESB-2016.1201  ESB-2016.1228  ESB-2016.1243  ESB-2016.1254  
ESB-2016.1263  ESB-2016.1789  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2016.0019
     Multiple Vulnerabilities in Tenable Nessus prior to version 6.5.6
                               4 March 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Tenable Nessus
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Access Privileged Data -- Remote/Unauthenticated
                      Denial of Service      -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2016-0800 CVE-2016-0799 CVE-2016-0798
                      CVE-2016-0797 CVE-2016-0705 CVE-2016-0704
                      CVE-2016-0703 CVE-2016-0702 
Member content until: Sunday, April  3 2016
Reference:            ESB-2016.0569
                      ESB-2016.0560
                      ESB-2016.0547
                      ESB-2016.0544
                      ESB-2016.0543

OVERVIEW

        Tenable has identified a number of vulnerabilities in Tenable Nessus
        and Nessus Enterprise prior to version 6.5.6. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "CVE-2016-0703 OpenSSL s2_srvr.c Non-zero Clear Key Length Handling
        SSLv2 Master Key Disclosure
        
        CVE-2016-0704 OpenSSL Simple s2_srvr.c RSA CMS Signature 
        Bleichenbacher Weakness
        
        CVE-2016-0705 OpenSSL DSA Private Key Handling Double-free Memory 
        Corruption
        
        CVE-2016-0702 OpenSSL Cache-bank Conflict Handling Side-channel RSA
        Key Disclosure
        
        CVE-2016-0800 Secure Sockets Layer Version 2 (SSLv2) Cross-Protocol
        TLS Session Decryption (DROWN)
        
        CVE-2016-0797 OpenSSL crypto/bn/bn_print.c BN_hex2bn() / BN_dec2bn()
        Functions NULL Pointer Dereference Heap Corruption
        
        CVE-2016-0799 OpenSSL crypto/bio/b_print.c doapr_outch() Function 
        Memory Allocation Failure Memory Corruption
        
        CVE-2016-0799 OpenSSL crypto/bio/b_print.c fmtstr() Function 
        Out-of-bounds Read Issue
        
        CVE-2016-0798 OpenSSL SRP Server apps/s_server.c 
        SRP_VBASE_get_by_user Method Username Handling Memory Exhaustion 
        Remote DoS
        
        At present, SecurityCenter does not enable SSLv2 and is not impacted
        by the 'DROWN' vulnerability. SecurityCenter, and other Tenable 
        products, are still being evaluated." [1]


MITIGATION

        The vendor advises users should upgrade to the latest version of 
        Tenable Nessus and Nessus Enterprise to resolve these issues. [1]


REFERENCES

        [1] [R2] OpenSSL '20160301' Advisory Affects Tenable Nessus
            https://www.tenable.com/security/tns-2016-03

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVtjV136ZAP0PgtI9AQIzsxAArki1+dcsarvvALnfyZWeIOHl8YOe2EW7
ixhekpu2W1rkFSUqwuq0OoPBLUJd1v9PP/WCnPjNpyBgikHsLwP7Vn/edQBH5AXa
livx/L9ii+wFPyNRicWuotuk8gVn3hEdq867C3rbG+ftEfoHiHKxZQ1/OYTvzHg6
p+i9GF7aLetFzZgfEsSxkD+z86ieHBuShWlIERBzpbSDaOkEXf2GLVkMRIH2ybwB
Ufd01IFitZOk49UdVU6IZrwyXTSJu7/i2TV84w/YSBiL5FZp4VIpJuuXu3s4AUv7
Xn76WinUFYs8bZMk2Fd00EWpl6z1riGjzBoKm6xW2RZ9Vvu4mGcAJzP1Nt6/IW0Q
chlK5MYIwIUCZYHH2M5Mnb7/NFx1Wfi0ae9Ln+M4UiRV2avig+M1QIiDtMyQsmxI
OXKpua/X8O/lUKqCg3IDkv3vhER0bJYRZrQmDkXBsjfHb1/6i6of/R5JRf7WdZYJ
O0zA1u6K2gCk2UQsLXgrAwCVbkreOgjNSdYC7JHlJBm9BsjRjohNRAPiITIBbI2d
iuOk48bkiun1UQC+LXUoJnnDyvuK2rEouTXWGQthictcKNDl/NvW2p0LfbiDe9az
/Ee1fzxv0W7FgCCIbdq/Ap3VWFX8jMKAIrFgmU+YkEVrlOC1XJ0ExQ+b5kBWw5Pa
98p8OHMeeMQ=
=pjWZ
-----END PGP SIGNATURE-----