Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R2] Nessus 4.2.0 Fixes Third-party Library Vulnerability

Medium

Synopsis

Early 4.0.x versions of Nessus for bundle the Qt browser. Nessus versions for Windows, not Unix, were affected by the following issue.

QtWeb Browser is prone to a flaw in the way it loads dynamic-link libraries (e.g. wintab32.dll). The program uses a fixed path to look for specific files or libraries. This path includes directories that may not be trusted or under user control. By placing a custom version of the file or library in the path, the program will load it before the legitimate version. This allows an attacker to inject custom code that will be run with the privilege of the program or user executing the program. This can be done by tricking a user into opening a HTML file from the local file system or a USB drive in some cases. This attack can be leveraged remotely in some cases by placing the malicious file or library on a network share or extracted archive downloaded from a remote source.

Note that this issue was originally reported to Tenable, and publicly, as a vulnerability in Nessus. Subsequent examination by Tenable determined it related to QtWeb. Many additional software packages from other vendors were reported vulnerable in the weeks after the QtWeb disclosure. Tenable had already upgraded to a fixed version of QtWeb before this was disclosed.

Solution

Tenable has updated Nessus to address this issue. Please see the instructions below:

Tenable has released version 4.2.0 that corresponds to the supported operating systems and architectures. This version is not impacted by the vulnerability.

To update your Nessus installation, follow these steps:

  1. Download the appropriate installation file to the system hosting Nessus or Nessus Enterprise, available at the Tenable Support Portal (https://support.tenable.com/support-center/index.php?x=&mod_id=200)
  2. Stop the Nessus service.
  3. Install according to your operating system procedures.
  4. Restart the Nessus service.

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.