aanriot 91ecf6c19e A buffer overflow vulnerability has been discovered in the
implementation of split() function in NASL, leading to consume a large
amount of CPU and memory resources before crashing. A solution is to
check for zero-length sep parameters.

CVE-2006-2093;
from ubuntu linux;
ok sturm@
2006-05-04 22:40:24 +00:00
..
2005-12-25 15:52:38 +00:00
2005-05-16 16:17:24 +00:00
2005-08-02 12:37:27 +00:00