(LiveHacking.Com) — Tenable Network Security has released version 5.0.1 of its famous vulnerability and configuration assessment scanner, Nessus.
Nessus 5.0.1 is a bug fix and enhancement release with the focus on a packet forgery fix on Windows setups and a compatibility fix on reading 64-bit database on a 32-bit systems and vice-versa.
Here is the list of enhancements and bug fixes with reference to Nessus 5.0.1 release announcements:
- Resolved an issue where packet forgery was not working on some Windows setups
- Improved the Windows installer which would fail on some setups
- Fixed several thread synchronization issues leading to a crash in certain situations
- Imported v1 reports are more legible
- Nessus can now read a 64-bit database on a 32-bit system and vice-versa
- Identified and resolved a minor memory leak issue occurring on all platforms
- Scanning with a SSL certificate defined in the policy would sometimes cause a scanner crash
- Workaround for CVE-2011-3389
- Worked around a possible incompatibility with the Fedora 16 / Debian 6 memory allocator
- Restored the ability to log in via certificate authentication on port 1241 when “force_pubkey_auth = no“
- This version of Nessus now includes OpenSSL version 1.0.0h
Nessus 5.0.1 can be download from here.