Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 4914] The packet-nbns.c dissector picks random data as the

Date: Mon, 11 Oct 2010 11:33:39 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4914

Frank Schorr <fschorr@xxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|FIXED                       |

--- Comment #4 from Frank Schorr <fschorr@xxxxxxxxxxx> 2010-10-11 11:33:35 PDT ---
My change was based on some assumptions that appear to not be correct (I'm
finding NBSS PDUs that are larger then 65536 bytes).   I reopened this bug so I
can supply a better resolution to this specific problem of the packet-nbns.c
dissector picking random data as the NBSS PDU length in certain situations
(mostly if there is missing traffic in the capture for the affected TCP
connection).

If reopening a closed bug is not the preferred way of handling a situation of
having to update a patch please let me know.  As an example would it be better
to leave this one closed and create a new bug that references this one?

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.