[R3] Tenable Appliance Affected by GNU C Library (glibc) Vulnerability

Related Vulnerabilities: CVE-2015-7547  

The Tenable Appliance is built on a Linux distribution that utilizes the GNU C Library (glibc). A vulnerability was recently reported impacting glibc, which may impact the Appliance. According to the researchers, glibc contains an overflow condition in the send_dg() and send_vc() functions in libresolv resolv/res_send.c where input is not properly validated when looking up domain names via the getaddrinfo() call. This may allow a remote attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Synopsis

The Tenable Appliance is built on a Linux distribution that utilizes the GNU C Library (glibc). A vulnerability was recently reported impacting glibc, which may impact the Appliance. According to the researchers, glibc contains an overflow condition in the send_dg() and send_vc() functions in libresolv resolv/res_send.c where input is not properly validated when looking up domain names via the getaddrinfo() call. This may allow a remote attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Solution

A glibc update is available via the online repositories, which are checked every night by the appliance. When the update is found a notification will appear in the administrative interface. Appliance administrators will need to direct the system to apply the updates so as not to interfere with scanning activities.