Tenable Log Correlation Engine (LCE) < 5.1.1 (TNS-2018-13)

medium Nessus Plugin ID 118399

Synopsis

A data aggregation application installed on the remote host is affected by a denial of service vulnerability.

Description

The version of Tenable Log Correlation Engine (LCE) installed on the remote host is a version prior to 5.1.1. It is, therefore, affected by multiple vulnerabilities:

- A flaw exists in the bundled third-party component OpenSSL library's key handling during a TLS handshake that causes a denial of service vulnerability due to key handling during a TLS handshake. (CVE-2018-0732)

- A flaw exists in the bundled third-party component OpenSSL library's RSA Key generation algorithm that allows a cache timing side channel attack to recover the private key. (CVE-2018-0737)

Solution

Upgrade to Tenable LCE version 5.1.1 or later.

See Also

https://www.tenable.com/security/tns-2018-13

https://www.openssl.org/news/openssl-1.0.2-notes.html

Plugin Details

Severity: Medium

ID: 118399

File Name: lce_5_1_1.nasl

Version: 1.5

Type: local

Agent: unix

Family: Misc.

Published: 10/26/2018

Updated: 10/25/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-0737

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:log_correlation_engine

Required KB Items: installed_sw/Log Correlation Engine Server

Exploit Ease: No known exploits are available

Patch Publication Date: 10/23/2018

Vulnerability Publication Date: 10/23/2018

Reference Information

CVE: CVE-2018-0732, CVE-2018-0737