Nessus 3.0.5 Available
This point release provides fixes for multiple minor issues with Nessus 3.0.4. The fixes include:
- Faster startup time, especially on laptops
- Improved the performance of the SYN port scanner
- Fixed a memory leak in the Mac OS X client
- Vista compatibility improved
- Various minor bugs fixed in the NASL engine
- Better chasing of zombie processes
Platform specific changes include:
- Windows : Improved Vista compatibility
- Mac OS X : fixed a memory leak in the client
- Mac OS X : fixed the way plugin preferences are processed (some prefs would not be displayed)
- Red Hat/Fedora : The priority of the nessusd startup script is now at 98 instead of 90, so that it starts later in the boot process
- On Debian, the dependencies of the Nessus package have been fixed to reflect the need of libssl0.9.7
Other changes of interest :
- nessusd.conf now accepts the option "listen_address" which can be used to bind the nessusd daemon to a specific port (just like 'nessusd -a' does). Adding 'listen_address 127.0.0.1" in nessusd.conf will force nessusd to only listen on the loopback interface (thanks to Martin Mačok for suggesting this)
- If you write your own plugins you'll notice that the changes you make are not reflected in the scan itself until the next plugin update. To speed up the startup time of nessusd, we now compare the timestamp of the plugins db with the time of the last update. This avoids inspecting thousands of files at startup. To force nessusd to inspect the timestamp of every plugin at startup, simply start it with the '-t' switch (as in 'nessusd -t -D').
Other minor fixes :
- nessus-update-plugins now displays a proper error message when plugins.nessus.org is unreachable
- 'nessus -i report.nbe -o report.html' would sometime crash when converting a malformed .nbe file to another format
- In NASL, shared_socket_acquire() now returns 0 on error, not -1
Nessus users should upgrade to Nessus 3.0.5 and obtain it directly from http://www.nessus.org. Tenable recommends that all Nessus 3 users perform the upgrade.
Are You Vulnerable to the Latest Exploits?
Enter your email to receive the latest cyber exposure alerts in your inbox.