Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 2687] Failure to dissect long SASL wrapped LDAP response

Date: Thu, 25 Sep 2008 05:08:40 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2687


Yaniv Kaul <mykaul@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|FIXED                       |




--- Comment #8 from Yaniv Kaul <mykaul@xxxxxxxxx>  2008-09-25 05:08:38 PDT ---
Looking at the code at
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ldap.c?revision=25942&view=markup
as well as the commit diff
(http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ldap.c?r1=24838&r2=25890
) pretty much shows that the core of this change, using LDAP_SASL_MAX_BUF in
packet-ldap.c was NOT committed.

Therefore I'm re-opening the bug. Specifically, I've also set it to be 4*64K
(whereas the previous value was 64K).

Perhaps the correct fix is not in packet-ldap.c (which I understand is created
automatically), but I'd still be happy to see it fixed.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.