SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Tenable Nessus Vendors:   Deraison, Renaud et al, Tenable Network Security
Tenable Nessus Permissions Error for Non-Default Directory Installation Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1040557
SecurityTracker URL:  http://securitytracker.com/id/1040557
CVE Reference:   CVE-2018-1141   (Links to External Site)
Date:  Mar 21 2018
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0.2 and before
Description:   A vulnerability was reported in Tenable Nessus. A local user can obtain elevated privileges on the target system.

When Nessus is installed in a non-default directory, the system does not enforce secure permissions for sub-directories. If the sub-directories are not manually secured, a local user can access the sub-directories to gain elevated privileges.

The vendor was notified on December 3, 2017.

@n0x00 reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix (7.0.3).

The vendor advisory is available at:

https://www.tenable.com/security/tns-2018-01

Vendor URL:  www.tenable.com/security/tns-2018-01 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC