Nessus 4.4.1 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.
Nessus 4.4.1 is a point release, containing several enhancements and minor bug fixes.
rom a user perspective, there is a new feature that allows the SYN scanner to be selectively throttled. A new setting, nessus_syn_scanner.global_throughput.max can be added to the nessusd.conf file. The option sets the maximum number of packets per second that Nessus will send during a SYN port scan (regardless of how many hosts are scanned in parallel).
In addition, several enhancements and bug fixes are included:
- When qdb_mem_usage is set to “High” (default), if Nessus fails to allocate enough memory to store the plugins DB, it switches to the “low” usage mode, instead of aborting
- The packet forgery subsystem is more scalable, which leads to faster network discovery (among other things)
- Consistency in characters permitted between command line user management and Nessus Web GUI
- MAC addresses now show up in .nessus v1 files
- Report generation speed has been improved
- Custom plugins handle the import() function better (they work now)
- The Nessus “generic” Linux build is now statically linked
- SuSE 11 now supported (32 and 64 bit platforms)
- The Ubuntu 10.10 builds now contain their own version of OpenSSL (Ubuntu silently disabled support for SSLv2)
- Fixed a Solaris “hang” issue happening during some scans
- Additional enhancements and bug fixes to the SYN Port Scanner
- Enhancements and bug fixes to several NASL functions, memory management (Linux, Win32) and Win32 robustness.