1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-28 02:19:04 +00:00

Fixing another bug found by Ilja, this time in Idle Scan: ipid_proxy_probe() was calling readtcppacket() with an unverified length argument.

This commit is contained in:
kris
2008-06-11 06:11:52 +00:00
parent 861f9ff24b
commit b5e046b693

View File

@@ -226,7 +226,7 @@ static int ipid_proxy_probe(struct idle_proxy_info *proxy, int *probes_sent,
}
else if (o.debugging > 1) {
error("Received unexpected response packet from %s during IP ID zombie probing:", inet_ntoa(ip->ip_src));
readtcppacket( (unsigned char *) ip,ntohs(ip->ip_len));
readtcppacket( (unsigned char *) ip,MIN(ntohs(ip->ip_len), bytes));
}
continue;
}