Nmap Updates

Discussion in 'other software & services' started by 1PW, Aug 21, 2025.

  1. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    2,460
    Location:
    .
    Nmap v7.98 has been released. (21-August-2025)

    Nmap | Download | Repository | Changelog |

    Nmap 7.98 [2025-08-21] §
    • [SECURITY] Rebuilt the Windows self-installer with NSIS 3.11, addressing CVE-2025-43715--a race condition in earlier NSIS versions that could allow local attackers to escalate to SYSTEM privileges when a vulnerable installer is run as SYSTEM. The Nmap installer does not run as SYSTEM by default.
    • Upgraded included libraries: OpenSSL 3.0.17, Lua 5.4.8
    • [Windows] Upgraded the included version of Npcap from 1.82 to 1.83, improving compatibility with PPPoE connections. See https://npcap.com/changelog
    • [macOS][GH#3127] Fix “dnet: Failed to open device en0” errors on macOS since Nmap 7.96. [Daniel Miller]
    • Fixed an issue in FTP bounce scan where a single null byte is written past the end of the receive buffer. The issue is triggered by a malicious server but does not cause a crash with default builds. [Tyler Zars]
    • [GH#3130] Fix a crash (stack exhaustion due to excessive recursion) in the parallel DNS resolver. Additionally, improved performance by processing responses that come after the request has timed out. [Daniel Miller]
    • [GH#2148] Fix the error, “Assertion failed: (datalink == DLT_EN10MB), function begin_sniffer, file scan_engine_raw.cc" when using Nmap with certain VPN interfaces. [Daniel Miller]
    • [GH#2757] Fix a crash in traceroute when using randomly-generated decoys: “Assertion `source->ss_family == AF_INET' failed" [Daniel Miller]
    • [GH#2899] When IP protocol scanning on IPv6 (-sO -6), skip protocol numbers that are registered as Extension Header values. When the --data option was used, these would fail the assertion “len == (u32) ntohs(ip6->ip6_plen)" [Daniel Miller]
    • [GH#3086] Prevent TCP Connect scan (-sT) from leaking one socket per hostgroup, which led to progressively slower scans and assertion failures in other scan phases. [Daniel Miller]
    • [NSE][GH#3133] Fix the error “nse_nsock.cc:637: void receive_callback(nsock_pool, nsock_event, void*): Assertion `lua_status(L) == 1' failed." when reading from an SSL connection. [Daniel Miller]
    • [NSE] Added NSE bindings for more libssh2 functions: channel_request, channel_request_pty_ex, channel_shell, and userauth_keyboard_interactive. ssh-brute will now use keyboard-interactive auth if password auth is not offered. [Daniel Miller, CrowdStrike]
    • [NSE][GH#3014] Fix dns-zone-transfer to handle nontraditional TLDs [Daniel Miller]
    • Fix a bug that was causing Nmap to send empty DNS packets for each target that was not found instead of just skipping them for reverse DNS.
    • [NSE] Fix/update/enhance tls.lua for newer TLSv1.3 ciphers, including post-quantum ciphersuites.
    • [GH#3114][Windows] Use only the DNS servers for up and configured interfaces for forward and reverse DNS lookups. When -e or -S are used, use only DNS servers that can be connected via that interface or source address. [Daniel Miller]
    • [Ndiff][GH#3115] Configured script check for PyPA 'build' module. [Daniel Miller]
    • [Zenmap] Updated Spanish and Chinese language strings for Zenmap to cover the latest strings.
    • [Zenmap][GH#2718] Zenmap language translation (i18n) files were not being installed. [Daniel Miller]
    • [Zenmap][GH#3066] Fix Zenmap error “ValueError: I/O operation on closed file” when Nmap crashes or fails. [Daniel Miller]
    • [Zenmap][GH#3084][GH#3127] Fix UnicodeDecodeError issues in ScriptMetadata and UmitConfigParser. [Daniel Miller]
    • [NSE][GH#3123] WS-Discovery parsing would error out if the MessageID UUID was not prefixed with “urn:”. [nnposter]
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.