Vulnerabilities > CVE-2006-2093 - Resource Management Errors vulnerability in Nessus
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Ubuntu Local Security Checks |
NASL id | UBUNTU_USN-279-1.NASL |
description | Jayesh KS discovered that the nasl_split() function in the NASL (Nessus Attack Scripting Language) library did not check for a zero-length separator argument, which lead to an invalid memory allocation. This library is primarily used in the Nessus security scanner; a remote attacker could exploit this vulnerability to cause the Nessus daemon to crash. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21373 |
published | 2006-05-13 |
reporter | Ubuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2017 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21373 |
title | Ubuntu 5.04 / 5.10 : libnasl vulnerability (USN-279-1) |
code |
|
References
- http://securitytracker.com/id?1015996
- http://www.osvdb.org/25084
- http://securityreason.com/securityalert/817
- http://www.vupen.com/english/advisories/2006/1541
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26034
- https://usn.ubuntu.com/279-1/
- http://www.securityfocus.com/archive/1/431994/100/0/threaded
- http://www.securityfocus.com/archive/1/431993/100/0/threaded
- http://www.securityfocus.com/archive/1/431987/100/0/threaded