ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 10958] New: NHRP dissector incorrect decode nhrp.client.pr

Date: Sat, 14 Feb 2015 07:58:27 +0000
Bug ID 10958
Summary NHRP dissector incorrect decode nhrp.client.protocol.addr shows 0.0.0.0
Product Wireshark
Version 1.6.7
Hardware x86
OS Ubuntu
Status UNCONFIRMED
Severity Minor
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 13445 [details]
NHRP registration and registration response with the error

Build Information:
Version 1.6.7

Copyright 1998-2012 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.10, with GLib 2.32.0, with libpcap (version
unknown), with libz 1.2.3.4, with POSIX capabilities (Linux), without libpcre,
with SMI 0.4.8, with c-ares 1.7.5, with Lua 5.1, without Python, with GnuTLS
2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with PortAudio
V19-devel (built Dec 10 2011 11:43:10), without AirPcap.

Running on Linux 3.8.0-44-generic, with libpcap version 1.1.1, with libz
1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0.

Built using gcc 4.6.3.

--
The client protocol address field (nhrp.client.protocol.addr) decodes to
0.0.0.0 yet 4 bytes selected in the packet byte window are 0x9b 0x01 0x92 0x06
or 155.1.146.6  - I believe this is wrong!


You are receiving this mail because:
  • You are watching all bug changes.