mirror of
https://github.com/nmap/nmap.git
synced 2026-01-01 20:39:02 +00:00
Fix Ncat's SOCKS5 password auth
See http://seclists.org/nmap-dev/2014/q3/4
This commit is contained in:
@@ -1,5 +1,9 @@
|
||||
# Nmap Changelog ($Id$); -*-text-*-
|
||||
|
||||
o [Ncat] Fixed SOCKS5 username/password authentication. The password length was
|
||||
being written in the wrong place, so authentication could not succeed.
|
||||
Reported with patch by Pierluigi Vittori.
|
||||
|
||||
o [NSE] Add s7-info script to get device information from Siemens PLCs via the
|
||||
S7 service, tunnelled over ISO-TSAP on TCP port 102. [Stephen Hilt]
|
||||
|
||||
|
||||
@@ -723,7 +723,7 @@ static int do_proxy_socks5(void)
|
||||
memcpy(socks5auth.data+1,username,strlen(username));
|
||||
len = 2 + strlen(username); // (version + strlen) + username
|
||||
|
||||
socks5auth.data[len]=strlen(password);
|
||||
socks5auth.data[len-1]=strlen(password);
|
||||
memcpy(socks5auth.data+len,password,strlen(password));
|
||||
len += 1 + strlen(password);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user