mirror of
https://github.com/nmap/nmap.git
synced 2025-12-09 06:01:28 +00:00
packet is OK from the get-go rather than running basic checks of it's own. In a nutshell this patch checks to make sure: 1) there is enough room for an IP header in the amount of bytes read 2) the IP version number is correct 3) the IP length fields are at least as big as the standard header 4) the IP packet received isn't a fragment, or is the initial fragment 5) that next level headers seem reasonable For TCP, this checks that there is enough room for the header in the number of bytes read, and that any option lengths are correct. The options checked are MSS, WScale, SackOK, Sack, and Timestamp. This also fixes a bug I discovered while testing. Since the Ethernet CRC (and other datalink-layer data) could be read and counted, it was being returned that there was more IP packet than there really was. This didn't cause an overrun of the buffer or anything, just that garbage data could have easily been read instead of real packet data. Now, if validity is checked for and the number of total bytes read is larger than the IP's length, the length is set to the IP header's total length field. This seems to work great after doing what testing I could. It's been out on nmap-dev for a couple of weeks without any bad reports (none at all for that matter). I reviewed this patch again before committing and it looks good as well.
44 KiB
44 KiB