Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3423] New: GSM DTAP: Activate PDP Context Request with DNS

Date: Fri, 17 Apr 2009 14:00:21 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3423

           Summary: GSM DTAP: Activate PDP Context Request with DNS server
                    address request parameter incorrectly marked as
                    malformed packet
           Product: Wireshark
           Version: 1.0.4
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: rspmn@xxxxxxxx



rspmn@xxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #2948|                            |review_for_checkin?
               Flag|                            |


Created an attachment (id=2948)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2948)
Sample pcap for "malformed packet"

Build Information:
TShark 1.0.4

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GLib 2.18.2, with libpcap 0.9-PRE-CVS, with libz 1.2.3, without
POSIX capabilities, with libpcre 7.8, without SMI, with ADNS, without Lua,
without GnuTLS, without Gcrypt, with MIT Kerberos.

Running on Linux 2.6.27.19-3.2-pae, with libpcap version 0.9-PRE-CVS.

Built using gcc 4.3.2 [gcc-4_3-branch revision 141291].

--
As can be seen from the attached pcap (Decode User DLT 0 as gsm_a_dtap)
Wireshark considers an Activate PDP Context Request which contains a
DNS Server Address Request parameter according to section 10.5.6.3 of
TS 24.008 to be a malformed packet.

The attached patch (against SVN revision 28067) fixes the problem for
the parameters DNS Server Address Request and P-CSCF Address Request.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.