Synopsis
GNU bash contains a flaw that is triggered when evaluating environment variables passed from another environment. After processing a function definition, bash continues to process trailing strings. Via certain applications, a local or remote attacker may inject shell commands, allowing local privilege escalation or remote command execution depending on the application vector.
The Tenable Appliance has been determined to be affected via the DHCP client that is run when configured to use DHCP for network configuration information on any interface. Additionally, it has been confirmed that the simpleupload.html page is vulnerable through the web server. The vulnerable simpleupload.html page is available without authentication beginning with the 2.6.2 version.
Solution
Tenable has released a patch script for all supported versions of the Appliance that addresses this vulnerability. This patch has been tested on Tenable Appliance 2.4.0-0, 2.4.1-0, 2.4.1-1, 2.4.1-2, 2.6.1, 2.6.2, 2.8.0, and 2.8.1.
The patch can be obtained from:
https://support.tenable.com/support-center/index.php?x=&mod_id=230
File md5sum
CVE-2014-7169.tar.gz ed0d79e9232f5584d58a6dfd9fb5cff6
Tenable has released version 3.0.0 of the appliance which also resolves this issue.
File md5sum SHA1 sum
TenableAppliance-3.0.0-64-update.tar 3830a586afa9f0fb4c70f1cfb119f839 2384da2a29ec860782c3cfd168334ed19b59bf4a
TenableAppliance-HyperV-3.0.0-64bit.zip 86911ed30f657b5ea5d19b529bae0610 3fb28fbafa611e2279e2d5f1b894de770c088453
TenableAppliance-VMware-3.0.0-64bit.ova 5fbb61a26a39b89e2024fe617a8e8d99 2f5bbf2d694d56f880bae328d58ca81c5c48a13a
Note that versions 1.x.x of the Appliance are not supported. Users should update to the latest release.
Additional References
http://seclists.org/oss-sec/2014/q3/650http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]