#VU200 Buffer overflow in Tenable Nessus in Apple Inc. Server applications


Published: 2016-07-22 | Updated: 2017-01-13

Vulnerability identifier: #VU200

Vulnerability risk: Critical

CVSSv3.1: 8.3 [AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-0718

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Tenable Nessus
Client/Desktop applications / Software for system administration
Oracle Solaris
Operating systems & Components / Operating system
Oracle Linux
Operating systems & Components / Operating system
macOS
Operating systems & Components / Operating system
Oracle VM Server for x86
Server applications / Other server solutions

Vendor: Tenable Network Security
Oracle
Apple Inc.

Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malformed input documents. A remote unauthenticated attacker can trigger a buffer overflow in the Expat XML parser library and execute arbitrary code by sending specially crafted data to vulnerable server.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install the latest version (6.8).

Vulnerable software versions

Tenable Nessus: 6.0.0 - 6.1.11

Oracle Solaris: 10 - 11.3

Oracle VM Server for x86: 3.3 - 3.4

Oracle Linux: 6 - 7

macOS: 10.11 - 10.11.5


External links
http://www.tenable.com/security/tns-2016-11
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://support.apple.com/cs-cz/HT206903


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability