ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 10463] New: UCP dissector bug of operation 31

Date: Thu, 11 Sep 2014 13:31:58 +0000
Bug ID 10463
Summary UCP dissector bug of operation 31
Product Wireshark
Version 1.10.6
Hardware x86
OS Fedora
Status UNCONFIRMED
Severity Minor
Priority Low
Component TShark
Assignee [email protected]
Reporter [email protected]

Created attachment 13051 [details]
pcap file containing UCP message operation 31 with PID 0639

Build Information:
TShark 1.10.6 (Git Rev Unknown from unknown)

Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GLib 2.36.4, with libpcap, with libz 1.2.7, with POSIX
capabilities (Linux), without libnl, with SMI 0.4.8, with c-ares 1.10.0, with
Lua 5.1, without Python, with GnuTLS 3.1.20, with Gcrypt 1.5.3, with MIT
Kerberos, with GeoIP.

Running on Linux 3.14.17-100.fc19.x86_64, with locale en_US.utf8, with libpcap
version 1.4.0, with libz 1.2.7.
Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz

Built using gcc 4.8.2 20131212 (Red Hat 4.8.2-7).
--
Dissector does not recognize PID 0639 in data of UCP operation 31.


You are receiving this mail because:
  • You are watching all bug changes.