Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script can not do anything nasty. This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nessus | Nessus | * | 2.2.7 (including) |
Nessus | Nessus | * | 3.0.2 (including) |
Nessus | Nessus | 2.2.0 (including) | 2.2.0 (including) |
Nessus | Nessus | 2.2.0_rc1 (including) | 2.2.0_rc1 (including) |
Nessus | Nessus | 2.2.1 (including) | 2.2.1 (including) |
Nessus | Nessus | 2.2.2 (including) | 2.2.2 (including) |
Nessus | Nessus | 2.2.3 (including) | 2.2.3 (including) |
Nessus | Nessus | 2.2.5 (including) | 2.2.5 (including) |
Nessus | Nessus | 2.2.6 (including) | 2.2.6 (including) |
Libnasl | Ubuntu | dapper | * |
Libnasl | Ubuntu | devel | * |
Libnasl | Ubuntu | edgy | * |
Libnasl | Ubuntu | feisty | * |