Vulnerability Description
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nessus | Nessus | <= 2.2.7 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/817
- http://securitytracker.com/id?1015996Patch
- http://www.osvdb.org/25084
- http://www.securityfocus.com/archive/1/431987/100/0/threaded
- http://www.securityfocus.com/archive/1/431993/100/0/threaded
- http://www.securityfocus.com/archive/1/431994/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1541Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26034
- https://usn.ubuntu.com/279-1/
- http://securityreason.com/securityalert/817
- http://securitytracker.com/id?1015996Patch
- http://www.osvdb.org/25084
- http://www.securityfocus.com/archive/1/431987/100/0/threaded
- http://www.securityfocus.com/archive/1/431993/100/0/threaded
- http://www.securityfocus.com/archive/1/431994/100/0/threaded
FAQ
What is CVE-2006-2093?
CVE-2006-2093 is a vulnerability with a CVSS score of 2.6 (LOW). Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a d...
How severe is CVE-2006-2093?
CVE-2006-2093 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2093?
Check the references section above for vendor advisories and patch information. Affected products include: Nessus Nessus.