Vulnerabilities > CVE-2019-3974 - Unspecified vulnerability in Tenable Nessus

047910
CVSS 8.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
tenable
microsoft
nessus

Summary

Nessus 8.5.2 and earlier on Windows platforms were found to contain an issue where certain system files could be overwritten arbitrarily, potentially creating a denial of service condition.

Vulnerable Configurations

Part Description Count
Application
Tenable
101
OS
Microsoft
1

Nessus

NASL familyMisc.
NASL idNESSUS_TNS_2019_3974.NASL
descriptionAccording to its self-reported version, the Tenable Nessus application running on the remote host is prior or equal to 8.5.2. It is, therefore, affected by a denial of service vulnerability due to a flaw where certain files could be overwritten arbitrarily. An authenticated, remote attacker could potentially exploit this vulnerability to create a denial of service condition.
last seen2020-06-01
modified2020-06-02
plugin id128118
published2019-08-23
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/128118
titleTenable Nessus < 8.6.0 Denial of Service vulnerability (TNS-2019-05)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(128118);
  script_version("1.3");
  script_cvs_date("Date: 2019/11/01  9:03:02");

  script_cve_id("CVE-2019-3974");

  script_name(english:"Tenable Nessus < 8.6.0 Denial of Service vulnerability (TNS-2019-05)");
  script_summary(english:"Checks the version of Tenable Nessus.");

  script_set_attribute(attribute:"synopsis", value:
"Tenable Nessus running on the remote host is affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Tenable Nessus application running on the remote host is prior or equal to
8.5.2. It is, therefore, affected by a denial of service vulnerability due to a flaw where certain files could be
overwritten arbitrarily. An authenticated, remote attacker could potentially exploit this vulnerability to create a
denial of service condition.");
  # https://www.tenable.com/security/tns-2019-05
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3f3268e5");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Tenable Nessus version 8.6.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-3974");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/08/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/08/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/23");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:tenable:nessus");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("nessus_detect.nasl", "os_fingerprint.nasl");
  script_require_keys("installed_sw/nessus");
  script_require_ports("Services/www", 8834);

  exit(0);
}

include('audit.inc');
include('http.inc');
include('vcf.inc');

# This only affects Windows according to the advisory
os = get_kb_item('Host/OS');
if (!os || 'Windows' >!< os) audit(AUDIT_OS_NOT, 'affected');

appname = 'nessus';
port = get_http_port(default:8834);
app_info = vcf::get_app_info(app:appname, port:port, webapp:TRUE);

vcf::check_granularity(app_info:app_info, sig_segments:3);

constraints = [
  { 'fixed_version' : '8.6.0' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);