-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2015.0086
     Tenable SecurityCenter affected by mutiple Apache vulnerabilities
                              21 August 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Tenable SecurityCenter
Operating System:     Linux variants
                      Network Appliance
                      VMware ESX Server
Impact/Access:        Provide Misleading Information -- Remote/Unauthenticated
                      Unauthorised Access            -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-3185 CVE-2015-3183 
Member content until: Sunday, September 20 2015
Reference:            ASB-2015.0079
                      ESB-2015.2154
                      ESB-2015.2113
                      ESB-2015.2004
                      ESB-2015.1872

OVERVIEW

        A number of vulnerabilities have been identified in Tenable 
        SecurityCenter versions 4.6.2.2, 4.7.0, 4.7.1, 4.8.0, 4.8.1, 4.8.2,
        5.0.0.1 and 5.0.1. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "CVE-2015-3183: The chunked transfer coding implementation in the 
        Apache HTTP Server before 2.4.14 does not properly parse chunk 
        headers, which allows remote attackers to conduct HTTP request 
        smuggling attacks via a crafted request, related to mishandling of 
        large chunk-size values and invalid chunk-extension characters in 
        modules/http/http_filters.c.
        
        CVE-2015-3185: The ap_some_auth_required function in 
        server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does
        not consider that a Require directive may be associated with an 
        authorization setting rather than an authentication setting, which 
        allows remote attackers to bypass intended access restrictions in 
        opportunistic circumstances by leveraging the presence of a module 
        that relies on the 2.2 API behavior.
        
        Note that the 4.x line of SecurityCenter is potentially impacted by
        only CVE-2015-3183, and the 5.x line is potentially impacted by both
        CVE-2015-3183 and CVE-2015-3185." [1]


MITIGATION

        The vendor advises a patch which address these issues has been 
        released for Tenable SecurityCenter 4.7.1. and 4.8.2. [1]
        
        The vendor also advises upgrading to the upcoming Tenable 
        SecurityCenter 5.0.2 will address these issues. [1]


REFERENCES

        [1] [R1] Apache Vulnerabilities Affects Tenable SecurityCenter
            http://www.tenable.com/security/tns-2015-11

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVdZ42X6ZAP0PgtI9AQIDThAAxUcbWjOf8XyEeNPiU3R2ZsPYlndIV2CJ
IjyyMwVgRQTl/WYSV4gL9Rcna6eN0zCDxowwrQLtFBHmcylv5ekSypNtjXn3ls2G
0I12PKCHSvxWztyo+e6JbiUffrFCogL57nocT0rZPmAwzMDtCJKeaj/X2V0pmr0j
lobeNPYxVKIK5TIxJPVA7XufytXgVMdvt3NDQayLMyBit7Fb1yAkEvAYpVNrYXjk
0o8bLlkk2ZQzDRFO6OZDZilmIyo6n+ytIjw05Pj8KxkkHWsDSwSo2QGaUQ+x2HK5
l/DfO8NybICKOdHIfE+ptfC40u2pDEufToT9atZQBt+bInhIO811IqL4EBvGPJQB
o5mc0oVotp3SmKX+3kpH1oSDW4oNECqrr697/uZXSeuFsFk53drVyUO55F/9KF+W
fIX9XVMtPqrty0uOx3IAF0YR/RBzhxpMeExLH7MQdbpym446/Rxzi65zZsBxUbN8
TdNJyk6zOHuLgo4l/1f5c49hT1jh8nLFnPW2a2w61q/QPp6+eXjUNQ01SoxkzRk0
XVLS1lpP9yeHqW5Ss6hxryGbZeWQKQ3kFiYakghyU2nRvfEE4cD0Wa/OyS/jA8Lj
tPybZDNuVjd+X++4CuSeBrfgOgx4DdoWn9O5TlPQgE/DZ4dBCtQZJba3UXNhTIFw
XTwIaOjx7u8=
=Qvlw
-----END PGP SIGNATURE-----