[R4] SecurityCenter 5.0.0.1 Affected by Third-party Library

Related Vulnerabilities: CVE-2006-7243   CVE-2015-2325   CVE-2015-2326   CVE-2015-4024   CVE-2015-4025  

SecurityCenter is potentially impacted by several vulnerabilities in PHP that were recently disclosed and fixed. Note that due to the time involved in doing a full analysis of each issue, Tenable has opted to patch the included version of PHP as a precaution, and to save time. CVE-2015-4025: PHP Multiple NULL Byte Injection Filter Bypass WeaknessesCVE-2015-4024: PHP main/rfc1867.c multipart_buffer_headers() Function HTTP Request Multipart/form-data Handling CPU Exhaustion Remote DoS CVE-2015-2326: Perl-Compatible Regular Expression (PCRE) pcre_compile2() Function Regex Handling Heap Buffer Overflow CVE-2015-2325: Perl-Compatible Regular Expression (PCRE) compile_branch() Function Regex Handling Heap Buffer Overflow CVE-2006-7243: PHP Pathname \0 Character file_exists Function Access Restriction Bypass Additionally. the latest version of PHP fix the following issues, but Tenable SecurityCenter is not affected: CVE-2015-3307: PHP ext/phar/phar.c phar_parse_metadata() Function TAR File Parsing Memory Corruption CVE-2015-4022: PHP ext/ftp/ftp.c ftp_genlist() Function Integer Overflow Heap Buffer Overflow CVE-2015-4021: PHP ext/phar/tar.c phar_parse_tarfile() Zero-length Entry Filename Handling Memory Corruption CVE-2015-4026: PHP pcntl_exec() Function NULL Byte Injection Filter Bypass Weakness Please note that Tenable strongly recommends that SecurityCenter be installed on a subnet that is not Internet addressable.

Synopsis

SecurityCenter is potentially impacted by several vulnerabilities in PHP that were recently disclosed and fixed. Note that due to the time involved in doing a full analysis of each issue, Tenable has opted to patch the included version of PHP as a precaution, and to save time.

  • CVE-2015-4025: PHP Multiple NULL Byte Injection Filter Bypass Weaknesses
  • CVE-2015-4024: PHP main/rfc1867.c multipart_buffer_headers() Function HTTP Request Multipart/form-data Handling CPU Exhaustion Remote DoS
  • CVE-2015-2326: Perl-Compatible Regular Expression (PCRE) pcre_compile2() Function Regex Handling Heap Buffer Overflow
  • CVE-2015-2325: Perl-Compatible Regular Expression (PCRE) compile_branch() Function Regex Handling Heap Buffer Overflow
  • CVE-2006-7243: PHP Pathname \0 Character file_exists Function Access Restriction Bypass

Additionally. the latest version of PHP fix the following issues, but Tenable SecurityCenter is not affected:

  • CVE-2015-3307: PHP ext/phar/phar.c phar_parse_metadata() Function TAR File Parsing Memory Corruption
  • CVE-2015-4022: PHP ext/ftp/ftp.c ftp_genlist() Function Integer Overflow Heap Buffer Overflow
  • CVE-2015-4021: PHP ext/phar/tar.c phar_parse_tarfile() Zero-length Entry Filename Handling Memory Corruption
  • CVE-2015-4026: PHP pcntl_exec() Function NULL Byte Injection Filter Bypass Weakness

Please note that Tenable strongly recommends that SecurityCenter be installed on a subnet that is not Internet addressable.

Solution

Tenable has released a patch for SecurityCenter 4.8.1 and 4.8.2 that addresses this vulnerability. This patch applies PHP 5.4.41, which is not affected. Upgrade information can be obtained from:

http://static.tenable.com/prod_docs/upgrade_security_center.html

The patch can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=160

File	   		      md5sum
SC-201506.1-rh5-32.tgz  fe3ff5507b968082826ccca4ffa38106  
SC-201506.1-rh5-64.tgz  bf669e4badbbc51fb70c90980ccb69c1  
SC-201506.1-rh6-32.tgz  e07b983d6aa6e2a771e4afc66a4d4a35  
SC-201506.1-rh6-64.tgz  1c1444d85eaab33f81b167175cb04c75  

Version 5.0.1 will be released as a fix for the current 5.0.0.1 release, which is currently scheduled for a July, 2015 release. Users of 4.6.x, 4.7.x, and 4.8.0 must upgrade to 4.8.1 or later to resolve this issue.