Tenable Nessus < 8.1.1 Multiple Vulnerabilities (TNS-2018-16)

Medium Nessus Plugin ID 120197

Synopsis

Tenable Nessus running on the remote host is affected by multiple vulnerabilities.

Description

According to its self-reported version, the Tenable Nessus application running on the remote host is 8.x prior to 8.1.1. It is, therefore, affected by multiple vulnerabilities:

- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack.
An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734)

- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)

Solution

Upgrade to Tenable Nessus version 8.1.1 or later.

See Also

https://www.tenable.com/security/tns-2018-16

Plugin Details

Severity: Medium

ID: 120197

File Name: nessus_tns_2018_16.nasl

Version: 1.2

Type: remote

Family: Misc.

Published: 2019/01/02

Updated: 2019/04/02

Dependencies: 10147

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-0734

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:nessus

Required KB Items: installed_sw/nessus

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/12/20

Vulnerability Publication Date: 2018/10/23

Reference Information

CVE: CVE-2018-0734, CVE-2018-5407