Nessus prior to 2.2.8, and 3.x prior to 3.0.3, allows user-assisted malicious users to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
nessus nessus 2.2.2 |
||
nessus nessus 2.2.3 |
||
nessus nessus 2.2.0_rc1 |
||
nessus nessus 2.2.1 |
||
nessus nessus 2.2.0 |
||
nessus nessus |
||
nessus nessus 2.2.5 |
||
nessus nessus 2.2.6 |