metasploit-framework/lib/rex/socket
sinn3r 22811257db Fix #4711 - Errno::EINVA (getpeername(2)) BrowserAutoPwn Fix
This patch fixes #4711.

The problem here is that the browser sometimes will shutdown some of our
exploit's connections (in my testing, all Java), and that will cause Ruby
to call a rb_sys_fail with "getpeername(2)". The error goes all the
way to Rex::IO::StreamServer's monitor_listener method, which triggers a
"break" to quit monitoring. And then this causes another chain of reactions
that eventually forces BrowserAutoPwn to quit completely (while the
JavaScript on the browser is still running)
2015-02-10 18:28:02 -06:00
..
comm Differentiate failed binds from connects, closes #4169 2014-11-11 14:59:41 -06:00
comm.rb Retab lib 2013-08-30 16:28:33 -05:00
ip.rb Fix improper use of host-endian or signed pack/unpack 2014-06-30 02:50:10 -05:00
parameters.rb Autonegotiate SSL/TLS versions when not explicit 2014-10-15 13:26:40 -05:00
range_walker.rb Fix beug with #next raising after the end 2014-01-09 15:03:11 -06:00
ssl_tcp.rb Typo: request -> requested in message 2014-10-15 13:48:22 -05:00
ssl_tcp_server.rb Auto-generated SSL certs now match "snakeoil" defaults 2014-11-21 18:25:04 -06:00
subnet_walker.rb Retab lib 2013-08-30 16:28:33 -05:00
switch_board.rb Retab lib 2013-08-30 16:28:33 -05:00
tcp.rb Retab lib 2013-08-30 16:28:33 -05:00
tcp_server.rb Fix #4711 - Errno::EINVA (getpeername(2)) BrowserAutoPwn Fix 2015-02-10 18:28:02 -06:00
udp.rb Retab lib 2013-08-30 16:28:33 -05:00