Lucene search

K
nessusThis script is Copyright (C) 2014-2023 and is owned by Tenable, Inc. or an Affiliate thereof.SECURITYCENTER_OPENSSL_1_0_1J.NASL
HistoryDec 30, 2014 - 12:00 a.m.

Tenable SecurityCenter Multiple DoS (TNS-2014-11)

2014-12-3000:00:00
This script is Copyright (C) 2014-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
27

5 Medium

AI Score

Confidence

Low

The SecurityCenter application installed on the remote host is affected by multiple denial of service vulnerabilities in the bundled OpenSSL library. The library is version 1.0.1 prior to 1.0.1j. It is, therefore, affected by the following vulnerabilities :

  • A memory leak exists in the DTLS SRTP extension parsing code. A remote attacker can exploit this issue, using a specially crafted handshake message, to cause excessive memory consumption, resulting in a denial of service condition. (CVE-2014-3513)

  • A memory leak exists in the SSL, TLS, and DTLS servers related to session ticket handling. A remote attacker can exploit this, using a large number of invalid session tickets, to cause a denial of service condition.
    (CVE-2014-3567)

#TRUSTED 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
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(80303);
  script_version("1.20");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/27");

  script_cve_id("CVE-2014-3513", "CVE-2014-3567");
  script_bugtraq_id(70584, 70586);

  script_name(english:"Tenable SecurityCenter Multiple DoS (TNS-2014-11)");
  script_summary(english:"Checks the version of OpenSSL in SecurityCenter.");

  script_set_attribute(attribute:"synopsis", value:
"The remote application is affected by multiple denial of service
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The SecurityCenter application installed on the remote host is
affected by multiple denial of service vulnerabilities in the bundled
OpenSSL library. The library is version 1.0.1 prior to 1.0.1j. It is,
therefore, affected by the following vulnerabilities :

  - A memory leak exists in the DTLS SRTP extension parsing
    code. A remote attacker can exploit this issue, using a
    specially crafted handshake message, to cause excessive
    memory consumption, resulting in a denial of service
    condition. (CVE-2014-3513)

  - A memory leak exists in the SSL, TLS, and DTLS servers
    related to session ticket handling. A remote attacker
    can exploit this, using a large number of invalid
    session tickets, to cause a denial of service condition.
    (CVE-2014-3567)");
  script_set_attribute(attribute:"see_also", value:"https://www.tenable.com/security/tns-2014-11");
  script_set_attribute(attribute:"see_also", value:"https://www.openssl.org/news/openssl-1.0.1-notes.html");
  script_set_attribute(attribute:"see_also", value:"https://www.openssl.org/news/secadv/20141015.txt");
  script_set_attribute(attribute:"see_also", value:"https://www.openssl.org/news/vulnerabilities.html");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in the vendor advisory.");
  script_set_attribute(attribute:"agent", value:"unix");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"manual");
  script_set_attribute(attribute:"cvss_score_rationale", value:"Score based on analysis of the vendor advisory.");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/15");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/11/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/30");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:tenable:securitycenter");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2014-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("securitycenter_installed.nbin", "securitycenter_detect.nbin");
  script_require_ports("Host/SecurityCenter/Version", "installed_sw/SecurityCenter");

  exit(0);
}

include("openssl_version.inc");
include("misc_func.inc");
include("ssh_func.inc");
include("telnet_func.inc");
include("hostlevel_funcs.inc");
include("install_func.inc");


enable_ssh_wrappers();

get_kb_item_or_exit("Host/local_checks_enabled");
sc_ver = get_kb_item("Host/SecurityCenter/Version");
port = 0;
if(empty_or_null(sc_ver))
{
  port = 443;
  install = get_single_install(app_name:"SecurityCenter", combined:TRUE, exit_if_unknown_ver:TRUE);
  sc_ver = install["version"];
}
if (! preg(pattern:"^4\.[6-9]", string:sc_ver)) audit(AUDIT_INST_VER_NOT_VULN, "SecurityCenter", sc_ver);

# Establish running of local commands
if ( islocalhost() )
{
  if ( ! defined_func("pread") ) audit(AUDIT_NOT_DETECT, "pread");
  info_t = INFO_LOCAL;
}
else
{
  sock_g = ssh_open_connection();
  if (! sock_g) audit(AUDIT_HOST_NOT, "able to connect via the provided SSH credentials.");
  info_t = INFO_SSH;
}

fix = "1.0.1j";
pattern = "OpenSSL (\d+(?:\.\d+)*(-beta\d+|[a-z]*))";

# Check version
line = info_send_cmd(cmd:"/opt/sc4/support/bin/openssl version");
if (info_t == INFO_SSH) ssh_close_connection();

if (! line) audit(AUDIT_VER_FAIL, "/opt/sc4/support/bin/openssl");
match = pregmatch(pattern:pattern, string:line);
if (isnull(match)) audit(AUDIT_UNKNOWN_APP_VER, line);
version = match[1];

# Check if vulnerable. Same branch only flags if the 1.0.1 matches,
# min check makes betas not vuln.
if (openssl_ver_cmp(ver:version, fix:fix, same_branch:TRUE, is_min_check:FALSE) < 0)
{
  report = '\n' +
    '\n  SecurityCenter version         : ' + sc_ver +
    '\n  SecurityCenter OpenSSL version : ' + version +
    '\n  Fixed OpenSSL version          : ' + fix +
    '\n';
  security_report_v4(port:port, severity:SECURITY_HOLE, extra:report);
  exit(0);
}
else audit(AUDIT_INST_VER_NOT_VULN, "OpenSSL (within SecurityCenter)", version);
VendorProductVersionCPE
tenablesecuritycentercpe:/a:tenable:securitycenter