-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1777
    [R1] Nessus Agent 7.1.0 Fixes Multiple Third-party Vulnerabilities
                               15 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Nessus Agent
Publisher:         Tenable
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-11214 CVE-2018-9251 CVE-2018-0739
                   CVE-2018-0733 CVE-2017-1000061 CVE-2017-18258
                   CVE-2017-16932 CVE-2017-16931 CVE-2017-11742
                   CVE-2017-9233 CVE-2017-9050 CVE-2017-9049
                   CVE-2017-9048 CVE-2017-9047 CVE-2017-8872
                   CVE-2017-7375 CVE-2017-7246 CVE-2017-7245
                   CVE-2017-7244 CVE-2017-7186 CVE-2017-6004
                   CVE-2017-5969 CVE-2017-5029 CVE-2017-3738
                   CVE-2016-9843 CVE-2016-9842 CVE-2016-9841
                   CVE-2016-9840 CVE-2016-9318 CVE-2016-9063
                   CVE-2016-5300 CVE-2016-5131 CVE-2016-4472
                   CVE-2016-3191 CVE-2016-1684 CVE-2016-1683
                   CVE-2016-1283 CVE-2016-0718 CVE-2015-9019
                   CVE-2015-8395 CVE-2015-8394 CVE-2015-8392
                   CVE-2015-8391 CVE-2015-8390 CVE-2015-8389
                   CVE-2015-8388 CVE-2015-8387 CVE-2015-8386
                   CVE-2015-8385 CVE-2015-8384 CVE-2015-8383
                   CVE-2015-8382 CVE-2015-8381 CVE-2015-8380
                   CVE-2015-7995 CVE-2015-5073 CVE-2015-3217
                   CVE-2015-2328 CVE-2015-2327 CVE-2014-9769
                   CVE-2014-8964 CVE-2012-6702 CVE-2012-6139
                   CVE-2012-0876  

Reference:         ASB-2018.0118
                   ESB-2018.0893
                   ESB-2018.0484
                   ESB-2018.1765
                   ESB-2012.1093
                   ESB-2012.0742
                   ESB-2012.0552

Original Bulletin: 
   https://www.tenable.com/security/tns-2018-09

- --------------------------BEGIN INCLUDED TEXT--------------------

[R1] Nessus Agent 7.1.0 Fixes Multiple Third-party Vulnerabilities

Risk Information
CVE ID: Please see 'Synopsis' for CVE IDs
Tenable Advisory ID: TNS-2018-09
Risk Factor: High
CVSSv2 Base / Temporal Score: 9.0 / 6.3
CVSSv2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:UR)

Affected Products
Nessus Agent 7.0.3 and earlier

Advisory Timeline
2018-06-13 - [R1] Initial Release

Synopsis

Nessus Agent leverages third-party software to help provide underlying
functionality. Some of the third-party components were found to contain
vulnerabilities, and updated versions have been made available by the providers.
Out of caution and in line with good practice, Tenable opted to upgrade the
bundled third-party components to address the potential impact of these issues.

Nessus Agent 7.1.0 updates the following components:

OpenSSL has been updated from 1.0.2n to 1.0.2o- CVE-2017-3738, CVE-2018-0733,
CVE-2018-0739

expat has been updated from 2.2.1 to 2.2.5 - CVE-2017-11742, CVE-2017-9233,
CVE-2016-9063, CVE-2016-0718, CVE-2016-5300, CVE-2012-0876, CVE-2016-4472,
CVE-2012-6702

libjpeg has been updated from 8d to 9c - CVE-2018-11214

libXML2 has been updated from 2.9.4 to 2.9.7 - CVE-2017-18258, CVE-2017-16932,
CVE-2017-16931, CVE-2017-9050, CVE-2017-9049, CVE-2017-9048, CVE-2017-9047,
CVE-2017-8872, CVE-2017-7375, CVE-2017-5969, CVE-2016-9318, CVE-2016-5131,
CVE-2018-9251

libXMLSEC has been updated from 1.2.18 to 1.2.25 - CVE-2017-1000061

libXSLT has been updated from 1.1.27 to 1.1.32 - CVE-2012-6139, CVE-2015-7995,
CVE-2015-9019, CVE-2016-1683, CVE-2016-1684, CVE-2017-5029

Zlib has been updated from 1.2.8 to 1.2.11 - CVE-2016-9840, CVE-2016-9841,
CVE-2016-9842, CVE-2016-9843

libPCRE has been updated from 7.8 to 8.42 - CVE-2014-8964, CVE-2014-9769,
CVE-2015-2327, CVE-2015-2328, CVE-2015-3217, CVE-2015-5073, CVE-2015-8380,
CVE-2015-8381, CVE-2015-8382, CVE-2015-8383, CVE-2015-8384, CVE-2015-8385,
CVE-2015-8386, CVE-2015-8387, CVE-2015-8388, CVE-2015-8389, CVE-2015-8390,
CVE-2015-8391, CVE-2015-8392, CVE-2015-8394, CVE-2015-8395, CVE-2016-1283,
CVE-2016-3191, CVE-2017-6004, CVE-2017-7186, CVE-2017-7244, CVE-2017-7245,
CVE-2017-7246

Note: The CVSSv2 score used in this advisory reflects CVE-2015-8391, as it is
considered the highest risk. To view information on the remaining CVE IDs
mentioned above, please visit https://nvd.nist.gov/vuln/search.

Solution

Tenable has released Nessus Agent version 7.1.0 to address these third-party
vulnerabilities. The installation files can be obtained from the Tenable
Downloads Portal (https://www.tenable.com/downloads/nessus-agents)

Additional References

https://nvd.nist.gov/vuln/search
https://docs.tenable.com/releasenotes/nessus/nessus711.htm
https://docs.tenable.com/releasenotes/nessusagent/agent710.htm
https://docs.tenable.com/NessusAgent.htm

This page contains information regarding security vulnerabilities that may
impact Tenable's products. This may include issues specific to our software, or
due to the use of third-party libraries within our software. Tenable strongly
encourages users to ensure that they upgrade or apply relevant patches in a
timely manner.

Tenable takes product security very seriously. If you believe you have found a
vulnerability in one of our products, we ask that you please work with us to
quickly resolve it in order to protect customers. Tenable believes in responding
quickly to such reports, maintaining communication with researchers, and
providing a solution in short order.

For more details on submitting vulnerability information, please see our
Vulnerability Reporting Guidelines page.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GU7+
-----END PGP SIGNATURE-----