First published: Sat Apr 29 2006(Updated: )
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus | <=2.2.7 | |
Tenable Nessus | <=3.0.2 | |
Tenable Nessus | =2.2.0 | |
Tenable Nessus | =2.2.0_rc1 | |
Tenable Nessus | =2.2.1 | |
Tenable Nessus | =2.2.2 | |
Tenable Nessus | =2.2.3 | |
Tenable Nessus | =2.2.5 | |
Tenable Nessus | =2.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2093 is classified as a denial of service vulnerability due to memory consumption issues.
To fix CVE-2006-2093, upgrade Nessus to version 2.2.8 or later, or 3.0.3 or later.
Affects Nessus versions 2.2.0 through 2.2.7 and 3.0.0 through 3.0.2.
CVE-2006-2093 allows user-assisted attackers to cause a denial of service.
The impact of CVE-2006-2093 on Nessus is potentially significant memory consumption leading to service interruption.