Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

6.49BETA1 UltraProbe::icmpid() const: Assertion Error #154

Neo23x0 opened this issue Jun 5, 2015 · 4 comments

6.49BETA1 UltraProbe::icmpid() const: Assertion Error #154

Neo23x0 opened this issue Jun 5, 2015 · 4 comments


Copy link

Neo23x0 commented Jun 5, 2015

Compiling the current Nmap 6.49BETA1 from the published tarball and the github repo I get the following error on Kali Linux x64:

root@kali:~/download/nmap# nmap -sV Starting Nmap 6.49BETA1 ( ) at 2015-06-05 11:56 CEST nmap: u16 UltraProbe::icmpid() const: Assertion mypspec.proto == IPPROTO_ICMP || mypspec.proto == IPPROTO_ICMPV6' failed.`

I can avoid this error by using "-Pn", so I suppose this is related to the ICMP sweep.

Copy link

Was just about to report this myself :)

The crash occurs when a destination unreachable ICMP message is received.

nmap -V Nmap version 6.49BETA1 ( ) Platform: x86_64-unknown-linux-gnu Compiled with: nmap-liblua-5.2.3 openssl-1.0.1f libpcre-8.31 nmap-libpcap-1.7.3 nmap-libdnet-1.12 ipv6 Compiled without: Available nsock engines: epoll poll select

OS: Ubuntu 14.04 (tested on Desktop and Server)

When nmap undergoes host discovery, if a host responds with an ICMP Destination Unreachable, Nmap aborts with the following error:

nmap: u16 UltraProbe::icmpid() const: Assertion 'mypspec.proto == IPPROTO_ICMP || mypspec.proto == IPPROTO_ICMPV6' failed. Aborted (core dumped)

This issue has been reproduced with ICMP Destination Unreachable types 13 (Communication Administratively Prohibited) and type 0 (Net Unreachable) messages. Other Destination Unreachable messages may also be affected.

Copy link

Replied on nmap-dev mailing list:

Thanks so much for this critical bug report! We recently added a new check
for ICMP messages which calls the icmpid() function, but we didn't add a
corresponding check to be sure that function was safe to call. Would you be
able to apply the attached patch and let us know if it solves the issue?

Attached patch

Copy link

Neo23x0 commented Jun 6, 2015

Works for me. No more errors. Thanks

The version I pulled from the github repo says "Nmap 6.47SVN". Is that OK?
I applied the patch to the tarball published on the website as Nmap-6.49BETA1 and the cloned github repo and compiled both. (just to be sure)

nmap-bot pushed a commit that referenced this issue Jun 7, 2015
Copy link

A fix for this issue has been released in Nmap 6.49BETA2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
None yet

No branches or pull requests

3 participants