Total vulnerabilities in the database
Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.
Software | From | Fixed in |
---|---|---|
nessus / nessus | 2.2.3 | 2.2.3.x |
nessus / nessus | 2.2.1 | 2.2.1.x |
nessus / nessus | 2.2.6 | 2.2.6.x |
nessus / nessus | - | 2.2.7.x |
nessus / nessus | - | 3.0.2.x |
nessus / nessus | 2.2.0 | 2.2.0.x |
nessus / nessus | 2.2.0_rc1 | 2.2.0_rc1.x |
nessus / nessus | 2.2.5 | 2.2.5.x |
nessus / nessus | 2.2.2 | 2.2.2.x |