Nmap Development mailing list archives

Re: BUG: nping overflow


From: Luis Martin <luis.martingarcia () gmail com>
Date: Thu, 22 Apr 2010 09:29:45 +0200

Hi Leonardo,

Thanks for reporting this bug. I'll have a look at it as soon as I
can. By the way, thank you for providing so many details and output,
that helps a lot.

Regards,

Luis MartinGarcia.



On Mon, Apr 19, 2010 at 11:36 PM, miniBill <cmt.minibill () gmail com> wrote:
Version: 0.5.30BETA1 [compiled]
OS:Ubuntu Lucid Lynx [with a personalized set of packets installed]

How to reproduce:
=============
./nping --udp -p 53 felix.nmap.org
--wait a few seconds--
sudo ./nping --udp -p 53 felix.nmap.org

What happens:
===========
The first nping signals a 100% loss [apparently being unprivileged
means I get no packets].
The second run gets the packets of the first run [just guessing] and
goes overflow

What should happen:
===============
Nping should discard the extra packets, or at least shouldn't go overflow

Reproduction difficulty:
=================
The glitch appears only when the two commands are given with enough
time between, but no too much.
I empirically suggest waiting a few seconds [6/8 seems a good choice].
If it doesn't do the trick, try again [it may happen the 5th, or 6th
time, or even after].

Logs:
====
[Note: if you want them copied elsewhere, just ask]
First logs, command line included in the file:
http://dl.dropbox.com/u/4305382/nmap-logs.txt

Second logs, with --debug, generated by this [it worked the 10th/11th
time, so if you wanna try it be patient (and enable passwordless sudo
XD)]:
./nping --debug --udp -p 53 felix.nmap.org | tee firstrun && sleep 8
&& sudo ./nping --debug --udp -p 53 felix.nmap.org | tee secondrun
http://dl.dropbox.com/u/4305382/firstrun
http://dl.dropbox.com/u/4305382/secondrun

Hope this helps.
 Leonardo
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: