Wireshark-bugs: [Wireshark-bugs] [Bug 5469] fix for malformed VNC handshake
Date: Tue, 7 Dec 2010 15:43:33 -0800 (PST)

--- Comment #5 from [email protected] 2010-12-07 15:43:31 PST ---
After reviewing TightVNC's source code and further prodding of the user who
experienced the issue, it turned out that the *client* that was used to
generate the invalid VNC traffic was a gtk client using the gtk-vnc library. 

It appears that any VNC clients using gtk-vnc before that particular bug was
fixed[1] will exhibit the described protocol violation that prevents wireshark
from dissecting the session. 


Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.