SB2024042978 - Tenable Nessus Network Monitor update for third-party components



SB2024042978 - Tenable Nessus Network Monitor update for third-party components

Published: April 29, 2024

Security Bulletin ID SB2024042978
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 25% Low 50% 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Insufficient control flow management (CVE-ID: CVE-2023-28711)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient control flow management. A local user can perform a denial of service (DoS) attack.


2) Information disclosure (CVE-ID: CVE-2023-46218)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to an error in curl that allows a malicious HTTP server to set "super cookies" that are then passed back to more origins than what is otherwise allowed or possible. A remote attacker can force curl to send such cookie to different and unrelated sites and domains.


3) Missing Encryption of Sensitive Data (CVE-ID: CVE-2023-46219)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to an error when handling HSTS long file names. When saving HSTS data to an excessively long file name, curl can end up removing all contents from the file, making subsequent requests using that file unaware of the HSTS status they should otherwise use. As a result, a remote attacker can perform MitM attack.


4) Out-of-bounds read (CVE-ID: CVE-2024-25629)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the ares__read_line() function when parsing local configuration files, such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, or `HOSTALIASES` file. A local user can insert a NULL character as the first character in a new line into one of the configuration files and crash the application.


Remediation

Install update from vendor's website.