Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2016.0019 Multiple Vulnerabilities in Tenable Nessus prior to version 6.5.6 4 March 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tenable Nessus Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-0800 CVE-2016-0799 CVE-2016-0798 CVE-2016-0797 CVE-2016-0705 CVE-2016-0704 CVE-2016-0703 CVE-2016-0702 Member content until: Sunday, April 3 2016 Reference: ESB-2016.0569 ESB-2016.0560 ESB-2016.0547 ESB-2016.0544 ESB-2016.0543 OVERVIEW Tenable has identified a number of vulnerabilities in Tenable Nessus and Nessus Enterprise prior to version 6.5.6. [1] IMPACT The vendor has provided the following details regarding the vulnerabilities: "CVE-2016-0703 OpenSSL s2_srvr.c Non-zero Clear Key Length Handling SSLv2 Master Key Disclosure CVE-2016-0704 OpenSSL Simple s2_srvr.c RSA CMS Signature Bleichenbacher Weakness CVE-2016-0705 OpenSSL DSA Private Key Handling Double-free Memory Corruption CVE-2016-0702 OpenSSL Cache-bank Conflict Handling Side-channel RSA Key Disclosure CVE-2016-0800 Secure Sockets Layer Version 2 (SSLv2) Cross-Protocol TLS Session Decryption (DROWN) CVE-2016-0797 OpenSSL crypto/bn/bn_print.c BN_hex2bn() / BN_dec2bn() Functions NULL Pointer Dereference Heap Corruption CVE-2016-0799 OpenSSL crypto/bio/b_print.c doapr_outch() Function Memory Allocation Failure Memory Corruption CVE-2016-0799 OpenSSL crypto/bio/b_print.c fmtstr() Function Out-of-bounds Read Issue CVE-2016-0798 OpenSSL SRP Server apps/s_server.c SRP_VBASE_get_by_user Method Username Handling Memory Exhaustion Remote DoS At present, SecurityCenter does not enable SSLv2 and is not impacted by the 'DROWN' vulnerability. SecurityCenter, and other Tenable products, are still being evaluated." [1] MITIGATION The vendor advises users should upgrade to the latest version of Tenable Nessus and Nessus Enterprise to resolve these issues. [1] REFERENCES [1] [R2] OpenSSL '20160301' Advisory Affects Tenable Nessus https://www.tenable.com/security/tns-2016-03 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVtjV136ZAP0PgtI9AQIzsxAArki1+dcsarvvALnfyZWeIOHl8YOe2EW7 ixhekpu2W1rkFSUqwuq0OoPBLUJd1v9PP/WCnPjNpyBgikHsLwP7Vn/edQBH5AXa livx/L9ii+wFPyNRicWuotuk8gVn3hEdq867C3rbG+ftEfoHiHKxZQ1/OYTvzHg6 p+i9GF7aLetFzZgfEsSxkD+z86ieHBuShWlIERBzpbSDaOkEXf2GLVkMRIH2ybwB Ufd01IFitZOk49UdVU6IZrwyXTSJu7/i2TV84w/YSBiL5FZp4VIpJuuXu3s4AUv7 Xn76WinUFYs8bZMk2Fd00EWpl6z1riGjzBoKm6xW2RZ9Vvu4mGcAJzP1Nt6/IW0Q chlK5MYIwIUCZYHH2M5Mnb7/NFx1Wfi0ae9Ln+M4UiRV2avig+M1QIiDtMyQsmxI OXKpua/X8O/lUKqCg3IDkv3vhER0bJYRZrQmDkXBsjfHb1/6i6of/R5JRf7WdZYJ O0zA1u6K2gCk2UQsLXgrAwCVbkreOgjNSdYC7JHlJBm9BsjRjohNRAPiITIBbI2d iuOk48bkiun1UQC+LXUoJnnDyvuK2rEouTXWGQthictcKNDl/NvW2p0LfbiDe9az /Ee1fzxv0W7FgCCIbdq/Ap3VWFX8jMKAIrFgmU+YkEVrlOC1XJ0ExQ+b5kBWw5Pa 98p8OHMeeMQ= =pjWZ -----END PGP SIGNATURE-----