Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3758] M3UA version 5 packet dissecting issue

Date: Tue, 21 Jul 2009 03:41:35 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3758





--- Comment #13 from Michael Tüxen <tuexen@xxxxxxxxxxxxx>  2009-07-21 03:41:34 PDT ---
The dissector does not know that the length field has to be 8. It just creates
a
tvb based on the length field and uses 8 bytes of it. So if the tvb is too
short,
an error is generated (that is what happened to your packet), if it is too
long,
there is no indication (this is the missing plausibility check).

The code you are looking at is only handling a parameter.
dissect_parameters() breaks the message up into parameters.

If you have further questions, please contact me directly:
tuexen@xxxxxxxxxxxxx.
This avoids flooding several people with messages not related to any bug.

Best regards
Michael


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.