Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Linux/UNIX Patch Auditing Using Nessus

Comprehensive Linux and UNIX Patch Knowledge

Ensuring that your Linux and UNIX systems are up-to-date with the latest patches is no small task. Largely due to ever evolving Linux distributions and virtual machine (VM) sprawl, you likely have a much larger Linux footprint than ever before. Systems administrators must keep tabs on the plethora of patches being released for each platform. Unlike Microsoft Windows systems, which have a regular patch cycle, Linux and UNIX variants, for the most part, release patches for software as they become available.

Thankfully, Nessus is here to help. More than 1,000 plugins have been released this year that check for local Linux and UNIX operating system's missing patches. This includes kernel patches and security updates to software packages being maintained by each distribution.

Nessus can help you:

  • Prioritize patching by using credentialed scanning and result filtering to identify the most critical patches.
  • Overcome false positives caused by back-ported security fixes.
  • Find vulnerabilities hidden by network and host-based firewalls.
  • Find and prioritize remotely-exploitable vulnerabilities.

Detect Missing Local Patches

Finding the missing patches on your Linux/UNIX systems is easy once you provide credentials to the Nessus server. In a lab environment, you can provide a root-level account and password to allow Nessus to log in. In production, I highly recommend the following configuration which uses sudo for privilege elevation:

Above is the Nessus configuration screen for entering SSH credentials. I’ve configured Nessus to use a public and private key pairing in addition to sudo.
  • Generate a private/public key pair for your Nessus server and assign a passphrase.
  • Add an account to your targets (for example, called "scanner") with normal user privileges, and assign a password.
  • Allow the Nessus server to log into all of your targets using the private/public key.
  • Configure the scanner account to use "sudo" to escalate to root privileges.
  • Upload the private/public key of the scanner account to your Nessus server, and provide the passphrase.
  • Configure Nessus to use "sudo" to become root.
  • Upload a list of known hosts to Nessus which defines the systems Nessus will attempt to log into.

Auditing Linux Security Updates

When provided with credentials as shown above, Nessus will report on all of the missing security patches for each target. If the target hosts haven’t had updates applied in some time, the resulting report can be quite lengthy. For example, I performed a credentialed patch audit against an older Ubuntu distribution:

Scanning older hosts with no patches applied often reveals more than 100 vulnerabilities per host, many of them critical.

Although I was only scanning one target, Nessus discovered 174 vulnerabilities. Prioritizing such a large number of vulnerabilities can be tricky. On the flip side, a complete package update will install several of the new updates. However, this doesn’t take into account packages installed from source code. To retrieve only the list of missing packages maintained by the distribution, you can apply a simple filter to search for plugins of type Local, and the resulting vulnerabilities drop to 77.

But, just how bad a shape are you really in? To pare the 77 number down even further, you can add a filter for exploitability. After applying the filter, the number of locally-exploitable vulnerabilities is down to a more manageable 36!

Dealing with Backported Software Patches

Often, a Linux distribution will not upgrade their packages to the latest and greatest versions of software. Instead, they’ll keep the existing software version and only apply the security patch, keeping the version number the same. In this instance, the software no longer contains a vulnerability, but the version being displayed by the banner will trace back to being vulnerable. When this occurs, Nessus will report potentially backported software versions as follows:

Refer to our previous blog entry for information on how back port detection works in Nessus. Also note that using the quick search for "back ported" will display only the results from the back ports collection of plugins.

When you see the alerts above, it's an indication that using credentials is a much better way to scan. Once credentials are supplied, you may still see the backported software, but the following message will display:

The message above is what you want to see when reviewing the backports plugin output.

Bad Daemons, Bad Daemons

Sometimes, administrators are forced to install packages from source code; either they are not happy with the distributions configuration, or the distribution is not offering the latest version. Nessus contains a plugin to easily identify running processes that are not associated with a distributions package:

Administrators often are not happy with the version of select software being offered by the Linux distribution they are using, forcing them to compile software from source.

Next, let’s use a filter to look for remote vulnerabilities and see if you can identify vulnerabilities associated with ProFTPD that were found remotely without credentials:

Compiling a software package from source has repercussions, as it may go unpatched for some time and contain vulnerabilities, as we see above with ProFTPD.

To get the results above, I set a plugin-type filter to "remote" and the plugin name filter to contain "proftpd".

Tip: You can use the "comma" delimiter to separate values in a filter.

Identify Exploitable Vulnerabilities

Another great way to prioritize patching is to use the exploitability index. If you've mastered credentialed scanning, you may want to focus on finding remotely-exploitable vulnerabilities. For example, the result filter can be used in the following ways:

Easily-exploitable remote vulnerabilities released before 2010:

Using the vulnerability publication date is a great way to assess risk in your organization. Going back in time and looking at older vulnerabilities speaks to the effectiveness of your patching policy and typically identifies hosts that have been neglected with respect to security.
Older vulnerabilities as a result of filtering

Remotely-exploitable web application vulnerabilities:

By removing “Apache,” Nessus will not display vulnerabilities in the web server itself (also be cautioned that if there is a web application with the word “apache” in the plugin name, those results will not display either).
Web application vulnerabilities as a result of extended filtering

Conclusion

Nessus provides a comprehensive view of your Linux and UNIX patch status. It allows you to dig deeply into your systems to identify remote vulnerabilities, find missing local patches, and pare down your results to prioritize patching.

The Passive Vulnerability Scanner (PVS) can also be used to sniff the network for potential vulnerabilities, providing an even deeper look into what’s lurking on your network.

Finally, for enterprise vulnerability management, you can use SecurityCenter, which allows you to spread scans across multiple Nessus servers while managing credentials from one central location. SecurityCenter also provides a robust platform for allowing users to run their own scans, report, alert, and track vulnerabilities. Below is a list of SecurityCenter dashboards that allow you to easily visualize missing patches in conjunction with compliance audits:

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.