ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 8101] New: tshark -2 -r fragments.pcap -R snmp -w out.pcap

Date: Mon, 17 Dec 2012 19:07:16 +0000
Bug ID 8101
Summary tshark -2 -r fragments.pcap -R snmp -w out.pcap segmentation fault
Classification Unclassified
Product Wireshark
Version 1.8.4
Hardware x86
OS Ubuntu
Status UNCONFIRMED
Severity Major
Priority Low
Component TShark
Assignee [email protected]
Reporter [email protected]

Created attachment 9709 [details]
pcap file cases segmentation fault as described in the text

Build Information:
> tshark -v
TShark 1.8.2

Copyright 1998-2012 Gerald Combs
<gerald-IZ8446WsY0/[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GLib 2.34.0, with libpcap, with libz 1.2.7, with POSIX
capabilities (Linux), with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.1, without
Python, with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP.

Running on Linux 3.5.0-17-generic, with locale en_US.UTF-8, with libpcap
version
1.3.0, with libz 1.2.7.

Built using gcc 4.7.2.
--
Running "tshark -2 -r linkDownFragmented.pcap -R snmp -w out.pcap" causes a
segmentation fault. linkDownFragmented.pcap is attached and contains two frames
with the two fragments of a single SNMP trap.

The idea was to see whether -2 would put all the fragments of the SNMP messages
in the out.pcap as described in
http://article.gmane.org/gmane.network.wireshark.user/15272

(gdb) run -2 -r linkDownFragmented.pcap -R snmp -w out.pcap
Starting program: /usr/bin/tshark -2 -r linkDownFragmented.pcap -R snmp -w
ost.pcap
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".

Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7b6e614 in wtap_buf_ptr () from /usr/lib/libwiretap.so.2
(gdb) bt
#0  0x00007ffff7b6e614 in wtap_buf_ptr () from /usr/lib/libwiretap.so.2
#1  0x0000555555563a2e in main ()
(gdb)


You are receiving this mail because:
  • You are watching all bug changes.