libnasl vulnerability

Related Vulnerabilities: CVE-2006-2093  

Jayesh KS discovered that the nasl_split() function in the NASL (Nessus Attack Scripting Language) library did not check for a zero-length separator argument, which lead to an invalid memory allocation. This library is primarily used in the Nessus security scanner; a remote attacker could exploit this vulnerability to cause the Nessus daemon to crash.

The problem can be corrected by updating your system to the following package versions:

4 May 2006

libnasl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 5.10
  • Ubuntu 5.04

Software Description

Details

Jayesh KS discovered that the nasl_split() function in the NASL (Nessus Attack Scripting Language) library did not check for a zero-length separator argument, which lead to an invalid memory allocation. This library is primarily used in the Nessus security scanner; a remote attacker could exploit this vulnerability to cause the Nessus daemon to crash.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 5.10
libnasl2
Ubuntu 5.04
libnasl2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

References