Nmap Development mailing list archives

Re: Segfault during script scan against DHCP


From: Kris Katterjohn <katterjohn () gmail com>
Date: Sat, 29 Aug 2009 13:11:09 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/29/2009 11:40 AM, Ron wrote:
Using the HEAD revision, unmodified, as of this morning.

Running a UDP/version scan against a Linksys WRT54g with this command:
$ sudo ./nmap -d -T4 -sV -sU -p60-70 192.168.1.1


I have a wrt54g, so I tried that and it happened.  However I quickly noticed
that it's not UDP, it's not DHCP, it's not the version scan and it's not the
wrt54g.

This reliably happens for me in NSE anytime and the target is specified as an
IP address, not a hostname.  Since the segfault happens occurs in NSE, I think
it may have something to do with the new virtual host handling.  But this is
just a guess as I haven't actually examined the patch (I'm just thinking it is
new and because it involves hostnames and IP addresses--I could be wrong!).

Cheers,
Kris Katterjohn

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=/Chb
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: