ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 1989] New: Don't stop dissection at malformed ASN.1 BER CH

Date: Wed, 14 Nov 2007 14:12:48 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1989

           Summary: Don't stop dissection at malformed ASN.1 BER CHOICE of
                    zero length
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: wireshark@xxxxxxx


Build Information:
wireshark 0.99.7 (SVN Rev 23447)
--
I'm evaluating the implementation of a protocol where the BER ASN.1 CHOICE
sometimes is of zero length. This clearly violates the ASN.1 standard which
does not allow this. The dissection of the packet stops at this point and shows
a "Malformed Packet" error.

It might benefit a user - not developing the application producing the packet
but just evaluating it - when the dissection does not stop there but continues
and only informs that there was something wrong.


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.