CVE-2006-2093

Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:nessus:nessus:2.2.6:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-04-29 10:02

Updated : 2024-02-28 10:42


NVD link : CVE-2006-2093

Mitre link : CVE-2006-2093

CVE.ORG link : CVE-2006-2093


JSON object : View

Products Affected

nessus

  • nessus
CWE
CWE-399

Resource Management Errors