SB2024042978 - Tenable Nessus Network Monitor update for third-party components
Published: April 29, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Insufficient control flow management (CVE-ID: CVE-2023-28711)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient control flow management. A local user can perform a denial of service (DoS) attack.
2) Information disclosure (CVE-ID: CVE-2023-46218)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error in curl that allows a malicious HTTP server to set "super cookies" that are then passed back to more origins than what is otherwise allowed or possible. A remote attacker can force curl to send such cookie to different and unrelated sites and domains.
3) Missing Encryption of Sensitive Data (CVE-ID: CVE-2023-46219)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to an error when handling HSTS long file names. When saving HSTS data to an excessively long file name, curl can end
up removing all contents from the file, making subsequent requests using that file
unaware of the HSTS status they should otherwise use. As a result, a remote attacker can perform MitM attack.
4) Out-of-bounds read (CVE-ID: CVE-2024-25629)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The
vulnerability exists due to a boundary error within the
ares__read_line() function when parsing local configuration files, such
as `/etc/resolv.conf`, `/etc/nsswitch.conf`, or `HOSTALIASES` file. A
local user can insert a NULL character as the first character in a new
line into one of the configuration files and crash the application.
Remediation
Install update from vendor's website.