Files
metasploit-gs/lib/rex/socket
sinn3r 22811257db Fix #4711 - Errno::EINVA (getpeername(2)) BrowserAutoPwn Fix
This patch fixes #4711.

The problem here is that the browser sometimes will shutdown some of our
exploit's connections (in my testing, all Java), and that will cause Ruby
to call a rb_sys_fail with "getpeername(2)". The error goes all the
way to Rex::IO::StreamServer's monitor_listener method, which triggers a
"break" to quit monitoring. And then this causes another chain of reactions
that eventually forces BrowserAutoPwn to quit completely (while the
JavaScript on the browser is still running)
2015-02-10 18:28:02 -06:00
..
2013-08-30 16:28:33 -05:00
2013-08-30 16:28:33 -05:00
2013-08-30 16:28:33 -05:00
2013-08-30 16:28:33 -05:00
2013-08-30 16:28:33 -05:00