Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R2] Nessus 4.2.0 Fixes Third-party Library Vulnerability

Medium

Synopsis

Early 4.0.x versions of Nessus for bundle the Qt browser. Nessus versions for Windows, not Unix, were affected by the following issue.

QtWeb Browser is prone to a flaw in the way it loads dynamic-link libraries (e.g. wintab32.dll). The program uses a fixed path to look for specific files or libraries. This path includes directories that may not be trusted or under user control. By placing a custom version of the file or library in the path, the program will load it before the legitimate version. This allows an attacker to inject custom code that will be run with the privilege of the program or user executing the program. This can be done by tricking a user into opening a HTML file from the local file system or a USB drive in some cases. This attack can be leveraged remotely in some cases by placing the malicious file or library on a network share or extracted archive downloaded from a remote source.

Note that this issue was originally reported to Tenable, and publicly, as a vulnerability in Nessus. Subsequent examination by Tenable determined it related to QtWeb. Many additional software packages from other vendors were reported vulnerable in the weeks after the QtWeb disclosure. Tenable had already upgraded to a fixed version of QtWeb before this was disclosed.

Solution

Tenable has updated Nessus to address this issue. Please see the instructions below:

Tenable has released version 4.2.0 that corresponds to the supported operating systems and architectures. This version is not impacted by the vulnerability.

To update your Nessus installation, follow these steps:

  1. Download the appropriate installation file to the system hosting Nessus or Nessus Enterprise, available at the Tenable Support Portal (https://support.tenable.com/support-center/index.php?x=&mod_id=200)
  2. Stop the Nessus service.
  3. Install according to your operating system procedures.
  4. Restart the Nessus service.

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]