Synopsis
SecurityCenter and PVS are potentially impacted by a vulnerability in OpenSSL that was recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time.
OpenSSL crypto/x509/x509_vfy.c X509_verify_cert() Function Alternative Certificate Chain Handling Certificate Validation Bypass
OpenSSL contains a flaw in the X509_verify_cert() function in crypto/x509/x509_vfy.c that is triggered when locating alternate certificate chains in cases where the first attempt to build such a chain fails. This may allow a remote attacker to cause certain certificate checks to be bypassed, leading to an invalid presented certificate being considered as valid.
Please note that Tenable strongly recommends that SecurityCenter and PVS be installed on a subnet that is not Internet addressable.
Solution
SecurityCenter:
Tenable has released a patch for SecurityCenter 4.6.2.2, 4.7.1, and 4.8.2 that addresses this vulnerability. This patch applies OpenSSL 1.0.1p, which is not affected. Upgrade information can be obtained from:
http://static.tenable.com/prod_docs/upgrade_security_center.html
The patch can be obtained from:
https://support.tenable.com/support-center/index.php?x=&mod_id=160
File md5sum
SC-201507.2-4.x-rh5-32.tgz 1b36f27ede9f2456a5273b399890fae4
SC-201507.2-4.x-rh5-64.tgz a01f077117b133a815b228e83676d7bc
SC-201507.2-4.x-rh6-32.tgz 9dea9ee20af9640c3a920907cae374d2
SC-201507.2-4.x-rh6-64.tgz ba5e56b23b701a3df8307ccd23547f43
Users of SecurityCenter 5.0.0.1 are not affected by this issue, as it was introduced in OpenSSL 1.0.1n and 5.0.0.1 uses 1.0.1m.
PVS:
Tenable has released version 4.4.0 that corresponds to the supported operating systems and architectures. This version bundles the updated OpenSSL library (1.0.2d), which is not affected. Upgrade information can be found at:
http://static.tenable.com/prod_docs/upgrade_pvs.html
The updated version of PVS can be obtained from:
https://support.tenable.com/support-center/index.php?x=&mod_id=170This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]