Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 2949] New: parallel redundancy protocol denial of service

Date: Thu, 9 Oct 2008 07:19:43 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2949

           Summary: parallel redundancy protocol denial of service
           Product: Wireshark
           Version: 1.0.3
          Platform: PC
        OS/Version: All
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: david.maciejak@xxxxxxxxx


Created an attachment (id=2334)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2334)
prp dos poc

Build Information:
wireshark 1.0.3

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.12.9, with GLib 2.16.4, with libpcap 0.9.5, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.4, with SMI 0.4.5,
with
ADNS, without Lua, with GnuTLS 2.0.4, with Gcrypt 1.2.4, with MIT Kerberos,
without PortAudio, without AirPcap.

Running on Linux 2.6.24-19-generic, with libpcap version 0.9.5.

Built using gcc 4.2.3 (Ubuntu 4.2.3-2ubuntu7).

--
Enabling the PRP dissector on the traffic enclosed crashes Wireshark.
see lt-tshark gdb trace below:

**
** ERROR:(packet.c:336):dissect_packet: code should not be reached

Program received signal SIGABRT, Aborted.
[Switching to Thread 0xb60e4b60 (LWP 21405)]
0xb7f93410 in __kernel_vsyscall ()
(gdb) backtrace
#0  0xb7f93410 in __kernel_vsyscall ()
#1  0xb615d085 in raise () from /lib/tls/i686/cmov/libc.so.6
#2  0xb615ea01 in abort () from /lib/tls/i686/cmov/libc.so.6
#3  0xb6533751 in g_assertion_message () from /usr/lib/libglib-2.0.so.0
#4  0xb69cbea9 in dissect_packet (edt=0x846e6a0, pseudo_header=0x8448f94,
pd=0x844f8a0 "�\003", fd=0xbfeefbe4, cinfo=0x0) at packet.c:336
#5  0xb69c0f14 in epan_dissect_run (edt=0x846e6a0, pseudo_header=0x8448f94,
data=0x844f8a0 "�\003", fd=0xbfeefbe4, cinfo=0x0) at epan.c:161
#6  0x08063abc in process_packet (cf=0x80743e0, offset=209, whdr=0x8448f80,
pseudo_header=0x8448f94, pd=0x844f8a0 "�\003") at tshark.c:2452
#7  0x080666f8 in main (argc=3, argv=0xbfeeff04) at tshark.c:2248


Regards,
David Maciejak of Fortinet's FortiGuard Global Security Research Team


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.