1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-05 22:19:03 +00:00

Apply a format string vulnerability patch by Dmitry Levin. The code in

question had already been made safe by Guillaume Rousse in r14432, but
Dmitry's patch also gets rid of a temporary buffer.
This commit is contained in:
david
2009-07-22 16:01:23 +00:00
parent d04076d602
commit 9a13866a7a
2 changed files with 4 additions and 6 deletions

View File

@@ -3603,7 +3603,6 @@ static bool do_one_select_round(UltraScanInfo *USI, struct timeval *stime) {
int newhoststate = HOST_UNKNOWN;
int optval;
recvfrom6_t optlen = sizeof(int);
char buf[128];
int numGoodSD = 0;
int err = 0;
u16 pport = 0;
@@ -3781,12 +3780,10 @@ static bool do_one_select_round(UltraScanInfo *USI, struct timeval *stime) {
case ENETDOWN:
case ENETRESET:
case ECONNABORTED:
Snprintf(buf, sizeof(buf), "Strange SO_ERROR from connection to %s (%d - '%s') -- bailing scan", host->target->targetipstr(), optval, strerror(optval) );
pfatal("%s", buf);
fatal("Strange SO_ERROR from connection to %s (%d - '%s') -- bailing scan", host->target->targetipstr(), optval, strerror(optval));
break;
default:
Snprintf(buf, sizeof(buf), "Strange read error from %s (%d - '%s')", host->target->targetipstr(), optval, strerror(optval));
perror(buf);
error("Strange read error from %s (%d - '%s')", host->target->targetipstr(), optval, strerror(optval));
break;
}