[R3] PVS 5.1.0 Fixes Multiple Third-party Library Vulnerabilities

Related Vulnerabilities: CVE-2015-7036   CVE-2016-2105   CVE-2016-2106   CVE-2016-2107   CVE-2016-2108   CVE-2016-2109   CVE-2016-2176  

Tenable's Passive Vulnerability Scanner (PVS) uses third-party libraries to provide certain standardized functionality. Two of these libraries were found to contain vulnerabilities and were fixed upstream. Those fixes have been integrated despite there being no known exploitation scenarios related to PVS. OpenSSL ASN.1 Encoder Negative Zero Value Handling Remote Memory Corruption OpenSSL AES-NI CBC MAC Check Padding Oracle MitM Information Disclosure OpenSSL crypto/evp/encode.c EVP_EncodeUpdate() Function Heap Buffer Overflow Weakness OpenSSL crypto/evp/evp_enc.c EVP_EncryptUpdate() Function Heap Buffer Overflow Weakness OpenSSL crypto/x509/x509_obj.c X509_NAME_oneline() Function ASN1 Strings Handling Out-of-bounds Read Memory Disclosure OpenSSL crypto/asn1/a_d2i_fp.c ASN.1 BIO Length Field Handling Memory Exhaustion Remote DoS SQLite FTS5 Extension Corrupt Database Query Handling Unspecified Buffer Overflow SQLite fts3_tokenizer() Function Optional Second Argument Handling Arbitrary Code Execution Note that the CVSSv2 score associated with this advisory is specific to the OpenSSL integration into PVS and assumes a worst-case scenario. These updates are proactive; Tenable has had no reports of exploitation and some of these issues may not impact PVS at all. Please note that Tenable strongly recommends that PVS be installed on a subnet that is not Internet addressable.

Synopsis

Tenable's Passive Vulnerability Scanner (PVS) uses third-party libraries to provide certain standardized functionality. Two of these libraries were found to contain vulnerabilities and were fixed upstream. Those fixes have been integrated despite there being no known exploitation scenarios related to PVS.

  • OpenSSL ASN.1 Encoder Negative Zero Value Handling Remote Memory Corruption
  • OpenSSL AES-NI CBC MAC Check Padding Oracle MitM Information Disclosure
  • OpenSSL crypto/evp/encode.c EVP_EncodeUpdate() Function Heap Buffer Overflow Weakness
  • OpenSSL crypto/evp/evp_enc.c EVP_EncryptUpdate() Function Heap Buffer Overflow Weakness
  • OpenSSL crypto/x509/x509_obj.c X509_NAME_oneline() Function ASN1 Strings Handling Out-of-bounds Read Memory Disclosure
  • OpenSSL crypto/asn1/a_d2i_fp.c ASN.1 BIO Length Field Handling Memory Exhaustion Remote DoS
  • SQLite FTS5 Extension Corrupt Database Query Handling Unspecified Buffer Overflow
  • SQLite fts3_tokenizer() Function Optional Second Argument Handling Arbitrary Code Execution

Note that the CVSSv2 score associated with this advisory is specific to the OpenSSL integration into PVS and assumes a worst-case scenario. These updates are proactive; Tenable has had no reports of exploitation and some of these issues may not impact PVS at all. Please note that Tenable strongly recommends that PVS be installed on a subnet that is not Internet addressable.

Solution

Tenable has released version 5.1.0 that corresponds to the supported operating systems and architectures. This version bundles the updated OpenSSL library (1.0.2h) and SQLite (3.11.1), which is not affected. The new version is available at:

https://support.tenable.com/support-center/index.php?x=&mod_id=170