LOW · 2.6

CVE-2006-2093

Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a d...

Vulnerability Description

Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.

CVSS Score

2.6

LOW

AV:N/AC:H/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
NessusNessus<= 2.2.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2006-2093?

CVE-2006-2093 is a vulnerability with a CVSS score of 2.6 (LOW). Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a d...

How severe is CVE-2006-2093?

CVE-2006-2093 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-2093?

Check the references section above for vendor advisories and patch information. Affected products include: Nessus Nessus.