Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0209 [R1]Nessus 6.11.3 Fixes Multiple Third-party Vulnerabilities 8 December 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tenable Nessus Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2017-3735 CVE-2017-3736 Member content until: Sunday, January 7 2018 Reference: ASB-2017.0202 ESB-2017.3132 ESB-2017.3120 ESB-2017.3100 OVERVIEW Tenable has identified a number of vulnerabilities in Tenable Nessus and Nessus Enterprise prior to version 6.11.3. [1] IMPACT The vendor has provided the following details regarding the vulnerabilities: "Risk Information CVE ID: CVE-2017-3735, CVE-2017-3736 • OpenSSL Security Bypass Vulnerability (CVE-2017-3735) • OpenSSL Information Disclosure Vulnerability (CVE-2017-3736) Tenable Advisory ID: TNS-2017-15 Risk Factor: Medium CVSSv2 Base / Temporal Score: 5.0/3.9 CVSSv2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C Affected Products Nessus 6.x to 6.11.2" [1] MITIGATION The vendor advises users should upgrade to the latest version of Tenable Nessus and Nessus Enterprise to resolve these issues. [1] REFERENCES [1] [R1]Nessus 6.11.3 Fixes Multiple Third-party Vulnerabilities https://www.tenable.com/security/tns-2017-15 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWioWJ4x+lLeg9Ub1AQgUVA/+K0PVABd3qLML0jVGCslZoJWVug4tlXJx a3xZ0j7mMlT9fQQrIA8k9WSBt4quHzZcI9zPAxO0hO/PcTbmcMQCkIV1wCuRSz+C x5LZ9OfMY9xMl3rKWCZ9EmvWN1+sHwvrsn9XZxXMpC+Ar8oM2mgV5zJ0PlRYz8gW vitIPnqhM+a1cf2BPzmze5L8yiA5Uzh6g59Na4FrjKV0NoTIu8OwM74fKMLcce5E g10aXl1a8V5QY/muQkt+yQNL/F37v43KJXpaP3s3n4HdNIZQJcsz53jSmDz/x6Gg M8FmOEyIcapP2gf7o1uMPt74JUlHBDntwVOFL0l/mt3djdHobn1sqCq2mM91MAC7 gR9kUHLgJ9hJmcY/0G1XsstGtHDgn8caskhzpEl/1RWOJLl1T32lM/9nrVgaFIlu OXQ1cjlbpmyemGrJZ0GVsD7cntH2q7h0MZFgltxKB1MAFqwrdnDYns3QbCbW4RfY 8A3yycR4aw/LMUVzT6axMoVx85SXAouH1zM3vOA0XJ0PtQXBxIkvuRi/LZ8J8Rzl FdUpiJOw0Ajp7Qv29/ZU1alogXUa0ZejCvTkYSs2rJCgDkZJ81BGB0yfoNczNxDi Y1v2zSF3O5jsBm51PNdtLbuXDbdCeW661qt8kKEpPMttDQI2uQ8yJtIUmbG/s6Mr kuWetXRbCnY= =RSqb -----END PGP SIGNATURE-----