[R1] LCE 5.0.1 Fixes Two Third-party Library Vulnerabilities

Related Vulnerabilities: CVE-2017-2629   CVE-2016-2183  

Log Correlation Engine (LCE) 5.0.0 is impacted by multiple vulnerabilities reported in a third-party library and an encryption algorithm. LCE was errantly using 3DES on TCP port 1243. The following vulnerabilities have been resolved with the updated libraries. cURL / libcurl lib/url.c allocate_conn() Function OCSP Stapling Validation Failure MitM Certificate Revocation Bypass [VulnDB 152389 / CVE-2017-2629] Triple Data Encryption Algorithm (3DES) 64-bit Block Size Birthday Attack HTTPS Cookie MitM Disclosure (SWEET32) [VulnDB 143387 / CVE-2016-2183] Please note that Tenable strongly recommends that LCE be installed on a subnet that is not Internet addressable.

Synopsis

Log Correlation Engine (LCE) 5.0.0 is impacted by multiple vulnerabilities reported in a third-party library and an encryption algorithm. LCE was errantly using 3DES on TCP port 1243.

The following vulnerabilities have been resolved with the updated libraries.

  • cURL / libcurl lib/url.c allocate_conn() Function OCSP Stapling Validation Failure MitM Certificate Revocation Bypass [VulnDB 152389 / CVE-2017-2629]
  • Triple Data Encryption Algorithm (3DES) 64-bit Block Size Birthday Attack HTTPS Cookie MitM Disclosure (SWEET32) [VulnDB 143387 / CVE-2016-2183]

Please note that Tenable strongly recommends that LCE be installed on a subnet that is not Internet addressable.

Solution

Log Correlation Engine (LCE) 5.0.1 has been released, which updates the linked cURL library and disabled 3DES. The new version can be obtained on the Tenable Support Portal.