Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2093

Overview

Vulnerability Score 2.6 2.6
CVE Id CVE-2006-2093
Last Modified 01 Sep 2011 12:00:00
Published 29 Apr 2006 06:02:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2006-2093

Summary

Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.

Vulnerable Systems

Application

  • Nessus 2.2.0

  • Nessus 2.2.0 Rc1

  • Nessus 2.2.1

  • Nessus 2.2.2

  • Nessus 2.2.3

  • Nessus 2.2.5

  • Nessus 2.2.6

  • Nessus 2.2.7

  • Nessus 3.0.2


References

SECTRACK - 1015996

XF - nessus-nasl-split-dos(26034)

VUPEN - ADV-2006-1541

UBUNTU - USN-279-1

BUGTRAQ - 20060425 Re: NASL 'Split' function Buffer overflow Vulnerability

BUGTRAQ - 20060425 NASL 'Split' function Buffer overflow Vulnerability

OSVDB - 25084

SREASON - 817


Last Updated: 27 May 2016 10:42:20