Nmap Development mailing list archives
Re: smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table)
From: Kit Peters <cpeters () ucmo edu>
Date: Fri, 19 Oct 2012 09:16:54 -0500
The new version of the script correctly reported the hosts as likely to be infected. KP On Fri, Oct 19, 2012 at 9:05 AM, Kit Peters <cpeters () ucmo edu> wrote:
I try that, and I get: ** BEGIN ** Starting Nmap 6.01 ( http://nmap.org ) at 2012-10-19 09:01 Central Daylight Time Winpcap present, dynamic linked to: WinPcap version 4.1.2 (packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b (20091008) --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: failed to initialize the script engine: C:\Program Files (x86)\Nmap/nse_main.lua:577: Bad script rule: D:\Users\cpeters\Desktop\nmap scripts\smb-check-vulns.nse -> '<eof>' expected near 'm' stack traceback: [C]: in function 'error' C:\Program Files (x86)\Nmap/nse_main.lua:577: in function 'get_chosen_scripts' C:\Program Files (x86)\Nmap/nse_main.lua:1103: in main chunk [C]: ? QUITTING! ** END ** Going to try copying the new version directly into my Nmap/scripts dir. KP On Wed, Oct 17, 2012 at 10:48 PM, David Fifield <david () bamsoftware com>wrote:On Wed, Oct 17, 2012 at 11:30:12AM -0500, Kit Peters wrote:Environment: nmap / zenmap 6.01 on windows 7 64-bit, against a WindowsXPSP2 host. Expected behavior: script output detailing detected vulnerabilities / infections Actual behavior: error message, "smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table)" Attached is complete output of nmap run.Thanks for reporting. I think I found the bug; the code was doing nmap:new_socket() in place of nmap.new_socket() I'm suprised that it ever worked. Maybe the change is because of the new Lua 5.2. David Fifield-- - Kit Peters (W0KEH), Engineer II KMOS TV Channel 6 / KTBG 90.9 FM University of Central Missouri http://kmos.org/ | http://ktbg.fm/
-- - Kit Peters (W0KEH), Engineer II KMOS TV Channel 6 / KTBG 90.9 FM University of Central Missouri http://kmos.org/ | http://ktbg.fm/ _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table) Kit Peters (Oct 17)
- Re: smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table) David Fifield (Oct 17)
- Re: smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table) Kit Peters (Oct 19)
- Re: smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table) Kit Peters (Oct 19)
- Re: smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table) Kit Peters (Oct 19)
- Re: smb-check-vulns.nse:366: calling 'new_socket' on bad self (string expected, got table) David Fifield (Oct 17)