mirror of
https://github.com/nmap/nmap.git
synced 2025-12-28 02:19:04 +00:00
Fixing another bug found by Ilja, this time in Idle Scan: ipid_proxy_probe() was calling readtcppacket() with an unverified length argument.
This commit is contained in:
@@ -226,7 +226,7 @@ static int ipid_proxy_probe(struct idle_proxy_info *proxy, int *probes_sent,
|
||||
}
|
||||
else if (o.debugging > 1) {
|
||||
error("Received unexpected response packet from %s during IP ID zombie probing:", inet_ntoa(ip->ip_src));
|
||||
readtcppacket( (unsigned char *) ip,ntohs(ip->ip_len));
|
||||
readtcppacket( (unsigned char *) ip,MIN(ntohs(ip->ip_len), bytes));
|
||||
}
|
||||
continue;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user