Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Linux :: Apps N-Z :: bt248.txt

Potential security vulnerability in Nessus






See below,

/jonas

---------- Forwarded message ----------
Date: Thu, 22 May 2003 17:16:05 -0400
From: Renaud Deraison <deraison@nessus.org>
To: nessus-announce@list.nessus.org
Subject: Nessus 2.0.6 has been released


Nessus 2.0.6 has been released. It fixes a potential security vulnerability in
libnasl as well as some other buglets.

There are some flaws in libnasl which might let a script break out of its
sandboxed environment and execute arbitrary commands on the nessusd host.
To exploit these flaws, an attacker would need to have a valid Nessus account
as well as the ability to upload arbitrary Nessus plugins in the Nessus
server (this option is disabled by default).

Not that these issues can NOT be exploited by a tested host to crash nessusd
remotely.

. Solution

Upgrade to Nessus 2.0.6 available at :
	http://ftp.nessus.org/nessus/nessus-2.0.6/
	ftp://ftp.nessus.org/pub/nessus/nessus-2.0.6/

. Workaround

Make sure the option 'plugins_upload' is set to 'no' in nessusd.conf

. Thanks

"Sir Mordred" <mordred@s-mail.com> discovered some ways to crash NASL scripts
by sending bad parameters to insstr(), ftp_log_in(), and other functions.
Upon investigation, we fixed similar issues in other nasl functions as well
as in libnessus.


-- 
Renaud Deraison
The Nessus Project
http://www.nessus.org


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH