mirror of
https://github.com/nmap/nmap.git
synced 2026-02-05 21:16:33 +00:00
Fix an assertion failure where raw TCP timing ping probes were wrongly used
during a TCP connect scan: nmap: scan_engine.cc:2843: UltraProbe* sendIPScanProbe(UltraScanInfo*, HostScanStats*, const probespec*, u8, u8): Assertion `USI->scantype != CONNECT_SCAN' failed.
This commit is contained in:
@@ -1,5 +1,12 @@
|
||||
# Nmap Changelog ($Id$); -*-text-*-
|
||||
|
||||
o Fixed an assertion failure where raw TCP timing ping probes were
|
||||
wrongly used during a TCP connect scan:
|
||||
nmap: scan_engine.cc:2843: UltraProbe* sendIPScanProbe(UltraScanInfo*,
|
||||
HostScanStats*, const probespec*, u8, u8):
|
||||
Assertion `USI->scantype != CONNECT_SCAN' failed.
|
||||
Thanks to LevelZero for the report. [David]
|
||||
|
||||
Nmap 4.75 [2008-9-7]
|
||||
|
||||
o [Zenmap] Added a new Scan Topology system. The idea is that if we
|
||||
|
||||
@@ -1022,8 +1022,9 @@ static bool pingprobe_is_appropriate(const UltraScanInfo *USI,
|
||||
return USI->scantype == CONNECT_SCAN || (USI->ping_scan && USI->ptech.connecttcpscan);
|
||||
case(PS_TCP):
|
||||
case(PS_UDP):
|
||||
return USI->tcp_scan || USI->udp_scan ||
|
||||
(USI->ping_scan && (USI->ptech.rawtcpscan || USI->ptech.rawudpscan));
|
||||
return (USI->tcp_scan && USI->scantype != CONNECT_SCAN) ||
|
||||
USI->udp_scan ||
|
||||
(USI->ping_scan && (USI->ptech.rawtcpscan || USI->ptech.rawudpscan));
|
||||
case(PS_PROTO):
|
||||
return USI->prot_scan || (USI->ping_scan && USI->ptech.rawprotoscan);
|
||||
case(PS_ICMP):
|
||||
|
||||
Reference in New Issue
Block a user