-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2016.0030
      A vulnerability has been identified in Tenable Appliance 4.0.0
                               15 March 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Tenable Appliance
Operating System:     Network Appliance
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                      Denial of Service               -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-7547  
Member content until: Thursday, April 14 2016
Reference:            ESB-2016.0422
                      ESB-2016.0417
                      ESB-2016.0406
                      ESB-2016.0394
                      ESB-2016.0387
                      ESB-2016.0419.2

OVERVIEW

        A vulnerability has been identified in Tenable Appliance 4.0.0. [1]


IMPACT

        The vendor has provided the following details regarding this issue:
        
        CVE-2015-7547: "The Tenable Appliance is built on a Linux 
        distribution that utilizes the GNU C Library (glibc). A 
        vulnerability was recently reported impacting glibc, which may 
        impact the Appliance. According to the researchers, glibc contains 
        an overflow condition in the send_dg() and send_vc() functions in 
        libresolv resolv/res_send.c where input is not properly validated 
        when looking up domain names via the getaddrinfo() call. This may 
        allow a remote attacker to cause a stack-based buffer overflow, 
        resulting in a denial of service or potentially allowing the 
        execution of arbitrary code." [1]


MITIGATION

        The vendor has stated that updates will be available through the 
        Tenable online repositories:
        
        "A glibc update is available via the online repositories, which are
        checked every night by the appliance. When the update is found a 
        notification will appear in the administrative interface. Appliance
        administrators will need to direct the system to apply the updates 
        so as not to interfere with scanning activities." [1]


REFERENCES

        [1] [R1] GNU C Library (glibc) Vulnerability Affects Tenable Appliance
            http://www.tenable.com/security/tns-2016-05

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVudjx36ZAP0PgtI9AQKsZg//QHSJCcqdBAo7+s8lVj6J7lq8xJFGVQFs
15mwM/3uodG0/o7ZES98sMyro/7AZMm0krVTL0Y7g23ySt2fSiH1nxQMOwYU5Oek
yL+rZf/ngIxGLVv9a3DTQ6nGUp6Oyc1P1I+Xri5i+xy0FOpI2+9LieAjUPkVdd2C
N967B4Uu81fxBSl/z9h4Oo45yrOxS/zFbgjn/5E1bHD+9mFKwSxvSWfZM/6b2gNI
D51FOvlNdchen8CacXxDC1Pl2chJJXGJ/YdSPftz5Ym4mB2CDJWM8Z3ZU3F5RyI9
ZsarvwgsInQ2TihKBAxuZMONMRaSW4COFKnzwPnBUAhyEwRNcAUxaKo4t6opkoUd
4YP2dD2zp3fiTPcVQyiziJe0hien+yvaZOGtK21gTvrJg8OBOd8HukYm+OQtbmUA
nHhOLXvPODMa0iV+In0YmB0uTzBKOFGgOQWmb380XC3+LsnKKpotQuPElK0pYOS5
439zwmJyOWgCVtJHghS1a9C5HEYh29M3sy2rCWIBNWt0q/f1SZ4QUZdikIcmojBO
mqToyX5Ubalp6h+j1v2pEDFGlLd8Xy3r8DaeyQb6N6KQG2p54akQgw9PG9OqBWTd
oHGPioZgV+QqY2Gc+KF1qVvOGYWOkSD/eZhlAaypD2Yu1GMc54P1v96ZIr8nARqS
u+SPZkSWd+o=
=nSTa
-----END PGP SIGNATURE-----