[R7] OpenSSL '20151203' Advisory Affects Tenable SecurityCenter

Related Vulnerabilities: CVE-2015-3194   CVE-2015-3195   CVE-2015-7575  

SecurityCenter and the Tenable Appliance are potentially impacted by vulnerabilities in OpenSSL that were recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time. CVE-2015-3194 - crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter. (SecurityCenter) CVE-2015-3195 - The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application. (3.x Appliance) CVE-2015-7575 - The Transport Layer Security (TLS) protocol contains a flaw that is due to the program accepting RSA-MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange messages. This may allow a remote attacker to theoretically conduct collision-based forgery attacks. (3.x Appliance) Based on a very cursory examination, it is believed that SecurityCenter is not impacted by CVE-2015-3195 or CVE-2015-3196, which were also fixed in this OpenSSL release. Regardless, this patch resolves those issues as well. Based on Developer input, the Tenable Appliance 3.x.y releases were affected by CVE-2015-3195 and CVE-2015-7575. The Tenable Appliance 4.0.0 release is not affected by CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 and CVE-2015-7575. Please note that Tenable strongly recommends that Tenable products be installed on a subnet that is not Internet addressable.

Synopsis

SecurityCenter and the Tenable Appliance are potentially impacted by vulnerabilities in OpenSSL that were recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time.

  • CVE-2015-3194 - crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter. (SecurityCenter)
  • CVE-2015-3195 - The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application. (3.x Appliance)
  • CVE-2015-7575 - The Transport Layer Security (TLS) protocol contains a flaw that is due to the program accepting RSA-MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange messages. This may allow a remote attacker to theoretically conduct collision-based forgery attacks. (3.x Appliance)

Based on a very cursory examination, it is believed that SecurityCenter is not impacted by CVE-2015-3195 or CVE-2015-3196, which were also fixed in this OpenSSL release. Regardless, this patch resolves those issues as well.

Based on Developer input, the Tenable Appliance 3.x.y releases were affected by CVE-2015-3195 and CVE-2015-7575. The Tenable Appliance 4.0.0 release is not affected by CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 and CVE-2015-7575.

Please note that Tenable strongly recommends that Tenable products be installed on a subnet that is not Internet addressable.

Solution

Nessus

Tenable has released a patch for all supported versions of SecurityCenter that addresses this vulnerability. This patch applies OpenSSL 1.0.1q, which is not affected. This patch has been tested on SecurityCenter versions 4.6.2.2, 4.7.1, 4.8.2, 5.0.0.1, 5.0.2, and 5.1.0. Additionally, SecurityCenter 5.2.0 was released on December 16, 2015, which includes OpenSSL 1.0.1.q and is a recommended mitigation, as it also brings a plethora of enhancements and features that are sure to delight. Upgrade information can be obtained from:

http://static.tenable.com/prod_docs/upgrade_security_center.html

The patch can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=160

File	   		      md5sum
SC-201601.1-4.x-rh5-32.tgz    87723711f52f1c22279a1597c445e387 
SC-201601.1-4.x-rh5-64.tgz    658fd17c6ee435f99612b72958da8170
SC-201601.1-4.x-rh6-32.tgz    ca9876612e3646d55ff455e3b614b08a
SC-201601.1-4.x-rh6-64.tgz    ff9027d2315bba4650d74d3a9d723765
SC-201601.1-5.x-rh5-64.tgz    4f7a4666232874226345589000c92edd
SC-201601.1-5.x-rh6-64.tgz    1ffc0779572997a753e575acc6d7772b

Tenable Appliance

Tenable Appliance users can upgrade to version 3.10.0 or 4.0.0, which are not affected. Updates can be obtained from:

https://support.tenable.com/support-center/index.php?x=&mod_id=230

Log Correlation Engine (LCE)

Tenable has released the Log Correlation Engine (LCE) 4.8.0 that address these issues. The updated version can be found at:

https://support.tenable.com/support-center/index.php?x=&mod_id=180