ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 4864] New: Wireshark Crash Mucrosoft vVisual C++ Runtime L

Date: Thu, 10 Jun 2010 08:15:05 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4864

           Summary: Wireshark Crash Mucrosoft vVisual C++ Runtime Library
           Product: Wireshark
           Version: 1.2.8
          Platform: x86-64
        OS/Version: Windows Server 2008
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: ag2400@xxxxxxx


Build Information:
Version 1.2.8 (SVN Rev 32676)

Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.16.6, (64-bit) with GLib 2.22.4, with WinPcap (version
unknown), with libz 1.2.3, without POSIX capabilities, without libpcre, without
SMI, with c-ares 1.7.0, with Lua 5.1, with GnuTLS 2.8.5, with Gcrypt 1.4.5,
without Kerberos, with GeoIP, with PortAudio V19-devel (built May  5 2010),
with
AirPcap.

Running on 64-bit Windows Server 2008 R2, build 7600, with WinPcap version
4.1.1
(packet.dll version 4.1.0.1753), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.8.5, Gcrypt 1.4.5, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 30729

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.



1)     the WinPcap version: 4.1.1

2)    the output of windump -D:
C:\Users\Administrator\Desktop\New folder>
C:\Users\Administrator\Desktop\New folder>windump -D
1.\Device\NPF_{13F063D9-A2E6-4446-B97D-051EF906AAFA} (Broadcom L2 NDIS client
dr
iver)
2.\Device\NPF_{AAC771EF-DBF6-414B-AE10-00A203FD9ECF} (Intel(R) Gigabit ET Quad
P
ort Server Adapter)

3)    the OS platform (Windows NT4, 2000...) and type (home, professional, x86
or x64,...) - Windows 2008R2 Enterprise x64.  System is Intel Xeon 2.93GHz (2)
with 16 GB ram.

4)    the network adapter(s) installed on the machine (type and model) - Intel
Gigabit ET Quad Port Server Adapter

5)    The list of all the special networking software, such as firewalls and
VPN clients, that are installed on the machine. - Only Windows 2008R2,
Wireshark, and Symantec Endpoint Protection 11.0.6 are installed.

--
 I'm capturing traffic from a Cisco 6500 span port.  I start the capture, wait
10 or 15 seconds, try to stop capture, wireshark crashes and I get the
following message:

"This application has requested the Runtime to terminate it in an unusual way. 
Please contact the application's support team for more information."

Then I get "Wireshark has stopped working.  Windows can check online for a
solution."
Problem details:
Problem signature:
  Problem Event Name:    APPCRASH
  Application Name:    wireshark.exe
  Application Version:    1.2.8.32676
  Application Timestamp:    4be1a8cb
  Fault Module Name:    libglib-2.0-0.dll
  Fault Module Version:    2.22.4.0
  Fault Module Timestamp:    4b6f546c
  Exception Code:    40000015
  Exception Offset:    000000000004e68a
  OS Version:    6.1.7600.2.0.0.274.10
  Locale ID:    1033
  Additional Information 1:    c153
  Additional Information 2:    c15344eccc56529108eb93ebd5169764
  Additional Information 3:    883c
  Additional Information 4:    883c2ee2f4384b3d9984f64d6f8def2c

Read our privacy statement online:
  http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409

If the online privacy statement is not available, please read our privacy
statement offline:
  C:\Windows\system32\en-US\erofflps.txt



I'll be glad to provide any other information.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.