Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0027 [R1] Nessus 6.10.4 Fixes One Vulnerability 24 March 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tenable Nessus Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Administrator Compromise -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-7199 Member content until: Saturday, April 22 2017 OVERVIEW A vulnerability has been identified in Tenable Nessus prior to version 6.10.4[1] IMPACT The vendor has provided the following details regarding the vulnerability: "Nessus was found to be vulnerable to a local privilege escalation issue due to insecure permissions when running in Agent Mode. This may allow an attacker to gain administrative privileges on the system hosting Nessus. CVE ID: CVE-2017-7199 VulnDB ID: 154114 Tenable Advisory ID: TNS-2017-08 Credit: Egil Aspevik [NTT Security] Risk Factor: High CVSSv2 Base / Temporal Score: 7.2 / 6.0 CVSSv2 Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)"[1] MITIGATION The vendor has provided the following advice regarding the vulnerability: "Tenable has released Nessus version 6.10.4 that corresponds to the supported operating systems and architectures. To update your Nessus installation, follow these steps: Download the appropriate installation file to the system hosting Nessus Professional or Nessus Manager, available at the Tenable Support Portal (https://support.tenable.com/support-center/index.php?x=&mod_id=200) Stop the Nessus service. Install according to your operating system procedures. Restart the Nessus service."[1] REFERENCES [1] [R1] Nessus 6.10.4 Fixes One Vulnerability http://www.tenable.com/security/tns-2017-08 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWNReZIx+lLeg9Ub1AQhcoA/9GAEcqDVZSMPgAOYAjqvZIoZMehLy6O+F chqQFPcGWcgvMFKvSXxcpgCZNH31qP+ZuapMB/hHJR1gxKyvegMSRxDmSg3jHdjl Zr2eivEdMgqHlrAdsa56cskwayWT9vdLjZfeBKSd6u0tNmBnlsYh1nFOAHjukmhR TC/wZUz9K4rn04czvv3bEPxVAOkElEBZyHu2A3U1O+tv+e+vejsMPOJAg1hx/duI kryeGkxDbrzpX//MPEknFdnS/1xUghVW7umdmyVDoj9Xxs2g+8VqQaeX6axAA7CF WTcdKOAwU3a8C+bSJt3wfPiPIdII5Q7+NrpYFnUeUkR4q2EnIQxXyxJrkxpaYTkb LDB2Vj0YPhssgjA7BZyXl5c3FVJyvhCgC7odAeVY+sX4OyU250ehmV9xrbUjYoUc jERZ8vux+Pq8Roj+hBGxtcHiRFKn21+BIdYA4P1hVxf65OFvIKKXZrpfa1yOB/lA Vlj0uaAlgSet64VzO+kTcgVKHeV6xCnAVfshjSBRwgtkBbxOE45NU1BIS40hpmvv UfLZ+f+AYkysK5UOVMC9Mcshq8ARP9JnO6OtyW9EBqk1TupyKOo24sb8sSqbs20F yyw7p3bqDawDQO1Mn2CF7ZEpZhzVLMcyJbr8NWYI5boYJKr5B8mvcGjGoYXT/Wjk GsysakU8yiM= =16rx -----END PGP SIGNATURE-----