Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0086 Tenable SecurityCenter affected by mutiple Apache vulnerabilities 21 August 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tenable SecurityCenter Operating System: Linux variants Network Appliance VMware ESX Server Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-3185 CVE-2015-3183 Member content until: Sunday, September 20 2015 Reference: ASB-2015.0079 ESB-2015.2154 ESB-2015.2113 ESB-2015.2004 ESB-2015.1872 OVERVIEW A number of vulnerabilities have been identified in Tenable SecurityCenter versions 4.6.2.2, 4.7.0, 4.7.1, 4.8.0, 4.8.1, 4.8.2, 5.0.0.1 and 5.0.1. [1] IMPACT The vendor has provided the following details regarding the vulnerabilities: "CVE-2015-3183: The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. CVE-2015-3185: The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. Note that the 4.x line of SecurityCenter is potentially impacted by only CVE-2015-3183, and the 5.x line is potentially impacted by both CVE-2015-3183 and CVE-2015-3185." [1] MITIGATION The vendor advises a patch which address these issues has been released for Tenable SecurityCenter 4.7.1. and 4.8.2. [1] The vendor also advises upgrading to the upcoming Tenable SecurityCenter 5.0.2 will address these issues. [1] REFERENCES [1] [R1] Apache Vulnerabilities Affects Tenable SecurityCenter http://www.tenable.com/security/tns-2015-11 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVdZ42X6ZAP0PgtI9AQIDThAAxUcbWjOf8XyEeNPiU3R2ZsPYlndIV2CJ IjyyMwVgRQTl/WYSV4gL9Rcna6eN0zCDxowwrQLtFBHmcylv5ekSypNtjXn3ls2G 0I12PKCHSvxWztyo+e6JbiUffrFCogL57nocT0rZPmAwzMDtCJKeaj/X2V0pmr0j lobeNPYxVKIK5TIxJPVA7XufytXgVMdvt3NDQayLMyBit7Fb1yAkEvAYpVNrYXjk 0o8bLlkk2ZQzDRFO6OZDZilmIyo6n+ytIjw05Pj8KxkkHWsDSwSo2QGaUQ+x2HK5 l/DfO8NybICKOdHIfE+ptfC40u2pDEufToT9atZQBt+bInhIO811IqL4EBvGPJQB o5mc0oVotp3SmKX+3kpH1oSDW4oNECqrr697/uZXSeuFsFk53drVyUO55F/9KF+W fIX9XVMtPqrty0uOx3IAF0YR/RBzhxpMeExLH7MQdbpym446/Rxzi65zZsBxUbN8 TdNJyk6zOHuLgo4l/1f5c49hT1jh8nLFnPW2a2w61q/QPp6+eXjUNQ01SoxkzRk0 XVLS1lpP9yeHqW5Ss6hxryGbZeWQKQ3kFiYakghyU2nRvfEE4cD0Wa/OyS/jA8Lj tPybZDNuVjd+X++4CuSeBrfgOgx4DdoWn9O5TlPQgE/DZ4dBCtQZJba3UXNhTIFw XTwIaOjx7u8= =Qvlw -----END PGP SIGNATURE-----