Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:35:31.394Z
Reserved: 2006-04-28T00:00:00
Link: CVE-2006-2093

No data.

Status : Modified
Published: 2006-04-29T10:02:00.000
Modified: 2024-11-21T00:10:32.487
Link: CVE-2006-2093

No data.