[R5] OpenSSL '20150709' Advisory Affects Tenable Products

Related Vulnerabilities: CVE-2015-1793  

SecurityCenter and PVS are potentially impacted by a vulnerability in OpenSSL that was recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time. OpenSSL crypto/x509/x509_vfy.c X509_verify_cert() Function Alternative Certificate Chain Handling Certificate Validation Bypass OpenSSL contains a flaw in the X509_verify_cert() function in crypto/x509/x509_vfy.c that is triggered when locating alternate certificate chains in cases where the first attempt to build such a chain fails. This may allow a remote attacker to cause certain certificate checks to be bypassed, leading to an invalid presented certificate being considered as valid. Please note that Tenable strongly recommends that SecurityCenter and PVS be installed on a subnet that is not Internet addressable.

Synopsis

SecurityCenter and PVS are potentially impacted by a vulnerability in OpenSSL that was recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time.

OpenSSL crypto/x509/x509_vfy.c X509_verify_cert() Function Alternative Certificate Chain Handling Certificate Validation Bypass

OpenSSL contains a flaw in the X509_verify_cert() function in crypto/x509/x509_vfy.c that is triggered when locating alternate certificate chains in cases where the first attempt to build such a chain fails. This may allow a remote attacker to cause certain certificate checks to be bypassed, leading to an invalid presented certificate being considered as valid.

Please note that Tenable strongly recommends that SecurityCenter and PVS be installed on a subnet that is not Internet addressable.

Solution

SecurityCenter:

Tenable has released a patch for SecurityCenter 4.6.2.2, 4.7.1, and 4.8.2 that addresses this vulnerability. This patch applies OpenSSL 1.0.1p, which is not affected. Upgrade information can be obtained from:

http://static.tenable.com/prod_docs/upgrade_security_center.html

The patch can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=160

File	   		      md5sum
SC-201507.2-4.x-rh5-32.tgz  1b36f27ede9f2456a5273b399890fae4
SC-201507.2-4.x-rh5-64.tgz  a01f077117b133a815b228e83676d7bc
SC-201507.2-4.x-rh6-32.tgz  9dea9ee20af9640c3a920907cae374d2
SC-201507.2-4.x-rh6-64.tgz  ba5e56b23b701a3df8307ccd23547f43

Users of SecurityCenter 5.0.0.1 are not affected by this issue, as it was introduced in OpenSSL 1.0.1n and 5.0.0.1 uses 1.0.1m.

PVS:

Tenable has released version 4.4.0 that corresponds to the supported operating systems and architectures. This version bundles the updated OpenSSL library (1.0.2d), which is not affected. Upgrade information can be found at:

http://static.tenable.com/prod_docs/upgrade_pvs.html

The updated version of PVS can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=170