nmap / nmap

Nmap - the Network Mapper. Github mirror of official SVN repository.
https://svn.nmap.org/
Other
10.11k stars 2.4k forks source link

Segmentation Fault. Am I possibly #2082

Closed ISRDjohn closed 4 years ago

ISRDjohn commented 4 years ago

NOTE: Npcap issues have moved to the Npcap repository

NOTE: Ncrack issues have moved to the Ncrack repository

Describe the bug

Completed Service scan at 18:35, 341.19s elapsed (178 services on 181 hosts)
NSE: Script scanning 181 hosts.
NSE: Starting runlevel 1 (of 2) scan.
Initiating NSE at 18:35
Completed NSE at 18:35, 4.45s elapsed
NSE: Starting runlevel 2 (of 2) scan.
Initiating NSE at 18:35
Segmentation fault (core dumped)
omi@sec2:~$ #cat tooMany.txt  | cut -d " " -f 4  | nmap -vv -sV -p53 -sT -oG bigRange.53.2 -Pn -iL -
omi@sec2:~$ wc -l tooMany.txt 
183 tooMany.txt
omi@sec2:~$ head tooMany.txt 
#masscan
open tcp 53 165.152.213.69 1594837725
open tcp 53 136.229.142.3 1594837725
open tcp 53 207.163.167.79 1594837725
open tcp 53 169.13.108.135 1594837725
open tcp 53 38.29.160.220 1594837725
open tcp 53 146.245.179.161 1594837725
open tcp 53 192.185.192.123 1594837725
open tcp 53 169.7.7.237 1594837726
open tcp 53 169.10.140.125 1594837726
omi@sec2:~$ #cat tooMany.txt  | cut -d " " -f 4  | nmap -vv -sV -p53 -sT -oG bigRange.53.2 -Pn -iL -
omi@sec2:~$ nmap -V

Nmap version 7.60 ( https://nmap.org )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.3.3 openssl-1.1.0g nmap-libssh2-1.8.0 libz-1.2.8 libpcre-8.39 libpcap-1.8.1 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select
omi@sec2:~$ cat tooMany.txt  | cut -d " " -f 4  | nmap -vv -sV -p53 -sT -oG bigRange.53.3.Replicate -Pn -iL -

Segmentation fault when using 'nmap -vv -sV -p53 -sT -oG bigRange.53.3.Replicate -Pn -iL -'

To Reproduce Run nmap -vv -sV -p53 -sT -oG bigRange.53.3.Replicate -Pn -iL - with 183 lines of IP addresses being piped in. E.g.:

Expected behavior Segmentation fault.

Version info (please complete the following information):

Starting Nmap 7.60 ( https://nmap.org ) at 2020-07-15 19:05 UTC ****INTERFACES**** DEV (SHORT) IP/MASK TYPE UP MTU MAC lo (lo) 127.0.0.1/8 loopback up 65536 lo (lo) ::1/128 loopback up 65536 eth0 (eth0) 134.209.117.155/20 ethernet up 1500 72:F7:B6:63:39:50 eth0 (eth0) 10.10.0.5/20 ethernet up 1500 72:F7:B6:63:39:50 eth0 (eth0) fe80::70f7:b6ff:fe63:3950/64 ethernet up 1500 72:F7:B6:63:39:50 docker0 (docker0) 172.17.0.1/16 ethernet up 1500 02:42:B3:C3:4A:8C docker0 (docker0) fe80::42:b3ff:fec3:4a8c/64 ethernet up 1500 02:42:B3:C3:4A:8C eth1 (eth1) 10.136.107.243/16 ethernet up 1500 4A:D5:38:B8:4C:31 eth1 (eth1) fe80::48d5:38ff:feb8:4c31/64 ethernet up 1500 4A:D5:38:B8:4C:31

**ROUTES** DST/MASK DEV METRIC GATEWAY 134.209.112.0/20 eth0 0 10.10.0.0/16 eth0 0 10.136.0.0/16 eth1 0 172.17.0.0/16 docker0 0 0.0.0.0/0 eth0 0 134.209.112.1 ::1/128 lo 0 fe80::42:b3ff:fec3:4a8c/128 docker0 0 fe80::48d5:38ff:feb8:4c31/128 eth1 0 fe80::70f7:b6ff:fe63:3950/128 eth0 0 ::1/128 lo 256 fe80::/64 eth1 256 fe80::/64 eth0 256 fe80::/64 docker0 256 ff00::/8 eth1 256 ff00::/8 eth0 256 ff00::/8 docker0 256



**Additional context**
Add any other context about the problem here, such as special network type.
fyodor commented 4 years ago

Thank you for your report, but we currently don't have resources to investigate crashes in old versions of Nmap that may already be fixed. Please upgrade to Nmap version 7.80 and try that. If you still get a crash, please open a new issue with full details like you provided here. If you are able to post a gdb backtrace so we can see where the crash is in the code, that's even better. But even crash reports without this (but with the latest version of Nmap) are useful. Thanks!