VYPR
Unrated severityNVD Advisory· Published Apr 29, 2006· Updated Apr 16, 2026

CVE-2006-2093

CVE-2006-2093

Description

Nessus before 2.2.8, and 3.x before 3.0.3, allows user-assisted attackers to cause a denial of service (memory consumption) via a NASL script that calls split with an invalid sep parameter. NOTE: a design goal of the NASL language is to facilitate sharing of security tests by guaranteeing that a script "can not do anything nasty." This issue is appropriate for CVE only if Nessus users have an expectation that a split statement will not use excessive memory.

Affected products

8
  • Nessus/Nessus8 versions
    cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*range: <=2.2.7
    • cpe:2.3:a:nessus:nessus:2.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:nessus:nessus:2.2.0_rc1:*:*:*:*:*:*:*
    • cpe:2.3:a:nessus:nessus:2.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:nessus:nessus:2.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:nessus:nessus:2.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:nessus:nessus:2.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:nessus:nessus:2.2.6:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.