Tenable SecurityCenter Alternative Certificate Validation Bypass Vulnerability (TNS-2015-08)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote application is affected by a certificate validation bypass
vulnerability.

Description :

The SecurityCenter application installed on the remote host is
affected by a certificate validation bypass vulnerability in the
bundled OpenSSL library. The library is version 1.0.1n or later and
prior to 1.0.1p. It is, therefore, affected by a flaw in the
X509_verify_cert() function that is triggered when locating alternate
certificate chains in cases where the first attempt to build such a
chain fails. A remote attacker can exploit this to cause certain
certificate checks to be bypassed, resulting in an invalid certificate
being considered valid.

See also :

http://www.tenable.com/security/tns-2015-08
https://www.openssl.org/news/secadv/20150709.txt

Solution :

Apply the relevant patch referenced in the vendor advisory.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)

Family: Misc.

Nessus Plugin ID: 85565 ()

Bugtraq ID: 75652

CVE ID: CVE-2015-1793

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now