CVE-2006-2093
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
29/04/2006
Last modified:
03/04/2025
Description
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Impact
Base Score 2.0
2.60
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:* | 2.2.7 (including) | |
cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:* | 3.0.2 (including) | |
cpe:2.3:a:nessus:nessus:2.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:nessus:nessus:2.2.0_rc1:*:*:*:*:*:*:* | ||
cpe:2.3:a:nessus:nessus:2.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:nessus:nessus:2.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:nessus:nessus:2.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:nessus:nessus:2.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:nessus:nessus:2.2.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://securityreason.com/securityalert/817
- http://securitytracker.com/id?1015996=
- http://www.osvdb.org/25084
- http://www.securityfocus.com/archive/1/431987/100/0/threaded
- http://www.securityfocus.com/archive/1/431993/100/0/threaded
- http://www.securityfocus.com/archive/1/431994/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1541
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26034
- https://usn.ubuntu.com/279-1/
- http://securityreason.com/securityalert/817
- http://securitytracker.com/id?1015996=
- http://www.osvdb.org/25084
- http://www.securityfocus.com/archive/1/431987/100/0/threaded
- http://www.securityfocus.com/archive/1/431993/100/0/threaded
- http://www.securityfocus.com/archive/1/431994/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1541
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26034
- https://usn.ubuntu.com/279-1/