From 65348958ebe77770a432dfd86807c2c800bc5993 Mon Sep 17 00:00:00 2001 From: david Date: Mon, 10 Nov 2008 21:44:35 +0000 Subject: [PATCH] Rearrange some symbolic constants in smb-check-vulns.nse so as not to confuse NSEDoc. Also fix a couple of typos. --- scripts/smb-check-vulns.nse | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/scripts/smb-check-vulns.nse b/scripts/smb-check-vulns.nse index 359c8cbb9..f091594ff 100644 --- a/scripts/smb-check-vulns.nse +++ b/scripts/smb-check-vulns.nse @@ -49,6 +49,10 @@ hostrule = function(host) end +local VULNERABLE = 1 +local PATCHED = 2 +local UNKNOWN = 3 + ---Check if the server is patched for ms08-067. This is done by calling NetPathCompare() with an -- illegal string. If the string is accepted, then the server is vulnerable; if it's rejected, then -- you're safe (for now). @@ -61,13 +65,10 @@ end -- NOTE: This CAN crash stuff (ie, crash svchost.exe and force a reboot), so beware! In about 20 -- tests I did, it crashed once. This is not a guarantee. -- ---@param host The hose object. +--@param host The host object. --@return (status, result) If status if alse, result is an error code; otherwise, result is either -- VULNERABLE for vulnerable, PATCHED for not vulnerable, or --- UNKNOWN if there was an error (likey vulnerable). -local VULNERABLE = 1 -local PATCHED = 2 -local UNKNOWN = 3 +-- UNKNOWN if there was an error (likely vulnerable). function check_ms08_067(host) local status, smbstate local bind_result, netpathcompare_result