A new libnasl/nessus vulnerability update is available for Ubuntu Linux. Here the announcement:
Ubuntu Security Notice USN-279-1 May 03, 2006
libnasl vulnerability
CVE-2006-2093
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)
The following packages are affected:
libnasl2
The problem can be corrected by upgrading the affected package to
version 2.2.3-1ubuntu0.1 (libnasl-dev and libnasl2) and
2.2.4-1ubuntu0.1 (libnasl-dev and libnasl2). After a standard system
upgrade you need to restart nessusd to effect the necessary changes.
Details follow:
Jayesh KS discovered that the nasl_split() function in the NASL
(Nessus Attack Scripting Language) library did not check for a
zero-length separator argument, which lead to an invalid memory
allocation. This library is primarily used in the Nessus security
scanner; a remote attacker could exploit this vulnerability to cause
the Nessus daemon to crash.
Updated packages for Ubuntu 5.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3-1ubuntu0.1.diff.gz
Size/MD5: 325024 934e559032064bdbfaf178e0e64b347d
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3-1ubuntu0.1.dsc
Size/MD5: 758 3326827ac8f9245a9188222ac517224d
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.3.orig.tar.gz
Size/MD5: 360918 ee66b86f0a808c9eb1e1756490e5c067
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_amd64.deb
Size/MD5: 334004 81c12b0e563175c9add90f462d55c46d
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_amd64.deb
Size/MD5: 101580 63413de59bcc9efe8cacbcc34380df67
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_i386.deb
Size/MD5: 312834 8c0bfa1daf1854ef200cc9bb4e50a54c
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_i386.deb
Size/MD5: 95840 4d8e2c1a91d8fc991f2fd1716b8583cb
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.3-1ubuntu0.1_powerpc.deb
Size/MD5: 338600 33be5486ddf9ca014d27bf77281200f0
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.3-1ubuntu0.1_powerpc.deb
Size/MD5: 99624 98dcfe611e5029dc619caf72dfd4da86
Updated packages for Ubuntu 5.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4-1ubuntu0.1.diff.gz
Size/MD5: 325052 1a6cb2d4eba535bf7d04c86e28753fce
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4-1ubuntu0.1.dsc
Size/MD5: 758 77166e15fa4998fccb44c731649318b9
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl_2.2.4.orig.tar.gz
Size/MD5: 361551 47de3e86725b5f54f5752233a4bc1ea8
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_amd64.deb
Size/MD5: 342848 312e410daa37b832a4462c0fd43a256e
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_amd64.deb
Size/MD5: 105872 17131088c3fcf03c61ff48c1068de163
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_i386.deb
Size/MD5: 314346 3e306ca23afe7008bc7fb1e0864763fa
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_i386.deb
Size/MD5: 96150 dc30810ccc3d00679da3f081517ada1d
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl-dev_2.2.4-1ubuntu0.1_powerpc.deb
Size/MD5: 344788 fa5ead6eae23d5811973691236068b5a
http://security.ubuntu.com/ubuntu/pool/main/libn/libnasl/libnasl2_2.2.4-1ubuntu0.1_powerpc.deb
Size/MD5: 102438 25bf747848d3cec7561298f198ffa1f5
--WChQLJJJfbwij+9x
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEWNvwDecnbV4Fd/IRAj/KAKD3RZ0tkxhNeSJEFo9lpAwj5qkOHACgnAYT
AtefgYNxDjd+QxZ+BcpQjtc=
=nk+h
-----END PGP SIGNATURE-----