Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 6506] New: RTPS2 dissector: invalid limit on octetsToNextH

Date: Thu, 27 Oct 2011 11:53:20 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6506

           Summary: RTPS2 dissector: invalid limit on octetsToNextHeader
                    in INFO_REPLY
           Product: Wireshark
           Version: SVN
          Platform: x86-64
        OS/Version: Ubuntu
            Status: NEW
          Severity: Minor
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: mitza@xxxxxxxxxx


Created an attachment (id=7322)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7322)
Patch for RTPS2 dissector

Build Information:
wireshark 1.7.0 (SVN Rev 39637 from /trunk)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.20.1, with Cairo 1.8.10, with Pango 1.28.0, with
GLib 2.24.1, with libpcap 1.0.0, with libz 1.2.3.3, without POSIX capabilities,
with threads support, without SMI, without c-ares, without ADNS, without Lua,
with Python 2.6.5, with GnuTLS 2.8.5, with Gcrypt 1.4.4, with MIT Kerberos,
without GeoIP, without PortAudio, without AirPcap.

Running on Linux 2.6.32-34-generic, with locale en_US.UTF-8, with libpcap
version 1.0.0, with libz 1.2.3.3, GnuTLS 2.8.5, Gcrypt 1.4.4.

Built using gcc 4.4.3.

--
The RTPS2 dissector doesn't handle octetsToNextHeader properly in INFO_RELY
submessages.  See patch attached.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.