We're now a non-profit! Support open source packet analysis by making a donation.

Wireshark-bugs: [Wireshark-bugs] [Bug 10011] New: OpenFlow 1.3 OXM field OXM_OF_IPV6_ND_SLL inco

Date: Sun, 20 Apr 2014 10:05:44 +0000
Bug ID 10011
Summary OpenFlow 1.3 OXM field OXM_OF_IPV6_ND_SLL incorrectly dissected (128 bits read instead of 48)
Classification Unclassified
Product Wireshark
Version 1.11.x (Experimental)
Hardware x86-64
OS Windows 8.1
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 12714 [details]
caputre with a packet showing incorrect dissection

Build Information:
Version 1.11.3 (v1.11.3-0-g1dd5d3a from master)

Compiled (64-bit) with GTK+ 2.24.14, with Cairo 1.10.2, with Pango 1.30.1, with
GLib 2.34.1, with WinPcap (4_1_3), with libz 1.2.5, with SMI 0.4.8, with c-ares
1.9.1, with Lua 5.2, without Python, with GnuTLS 2.12.18, with Gcrypt 1.4.6,
without Kerberos, with GeoIP, with PortAudio V19-devel (built Apr 15 2014),

Running on 64-bit Windows 8.1, build 9600, with WinPcap version 4.1.3
(packet.dll version, based on libpcap version 1.0 branch 1_0_rel0b
Dissection of OXM_OF_IPV6_ND_SLL triggers "malformed packet" comment in packet
list since it makes dissecting of further OXM fields impossible. 

It is possible that similar issue will be with OXM_OF_IPV6_ND_TLL since its
dissecting is basically the same.

You are receiving this mail because:
  • You are watching all bug changes.