Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3672] Buildbot crash output: fuzz-2009-07-06-9396.pcap

Date: Tue, 14 Jul 2009 13:42:44 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3672


Gerald Combs <gerald@xxxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |gerald@xxxxxxxxxxxxx




--- Comment #4 from Gerald Combs <gerald@xxxxxxxxxxxxx>  2009-07-14 13:42:43 PDT ---
If I enable EP_DEBUG_FREE and SE_DEBUG_FREE in emem.c, then run 

valgrind --tool=memcheck tshark -nVxr /tmp/fuzz-2009-07-06-9396.pcap >
/dev/null

I get a bunch of errors, including

==13974==  Access not within mapped region at address 0x115A42D90
==13974==    at 0x5D60F80: fragment_add_work (reassemble.c:721)
==13974==    by 0x5D613C0: fragment_add_common (reassemble.c:958)
==13974==    by 0x5D6154F: fragment_add (reassemble.c:977)
==13974==    by 0x61E8CE9: dissect_tcp (packet-tcp.c:3572)
==13974==    by 0x5D4B591: call_dissector_through_handle (packet.c:413)
==13974==    by 0x5D4BCAF: call_dissector_work (packet.c:504)
==13974==    by 0x5D4CC01: dissector_try_port_new (packet.c:890)
==13974==    by 0x5FDD457: dissect_ip (packet-ip.c:1658)
==13974==    by 0x5D4B591: call_dissector_through_handle (packet.c:413)
==13974==    by 0x5D4BCAF: call_dissector_work (packet.c:504)
==13974==    by 0x5D4CC01: dissector_try_port_new (packet.c:890)
==13974==    by 0x5F0F153: ethertype (packet-ethertype.c:243)


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.