Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/431987/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
https://usn.ubuntu.com/279-1/ | vendor-advisory x_refsource_UBUNTU |
http://www.securityfocus.com/archive/1/431993/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://securityreason.com/securityalert/817 | third-party-advisory x_refsource_SREASON |
http://www.vupen.com/english/advisories/2006/1541 | vdb-entry x_refsource_VUPEN |
http://www.securityfocus.com/archive/1/431994/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26034 | vdb-entry x_refsource_XF |
http://securitytracker.com/id?1015996 | vdb-entry x_refsource_SECTRACK |
http://www.osvdb.org/25084 | vdb-entry x_refsource_OSVDB |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/431987/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
https://usn.ubuntu.com/279-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.securityfocus.com/archive/1/431993/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://securityreason.com/securityalert/817 | third-party-advisory x_refsource_SREASON x_transferred |
http://www.vupen.com/english/advisories/2006/1541 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.securityfocus.com/archive/1/431994/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26034 | vdb-entry x_refsource_XF x_transferred |
http://securitytracker.com/id?1015996 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.osvdb.org/25084 | vdb-entry x_refsource_OSVDB x_transferred |
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.6 | LOW | AV:N/AC:H/Au:N/C:N/I:N/A:P |