Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 12770] New: when http server port use not standard port ,

Date: Sat, 20 Aug 2016 03:36:31 +0000
Bug ID 12770
Summary when http server port use not standard port , tshark only check HTTP/1.1
Product Wireshark
Version 2.0.5
Hardware All
OS All
Status UNCONFIRMED
Severity Major
Priority Low
Component TShark
Assignee [email protected]
Reporter [email protected]

Build Information:
TShark (Wireshark) 2.0.5 (Git Rev Unknown from unknown)

Copyright 1998-2016 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with libpcap, without POSIX capabilities, without libnl, with
libz 1.2.8, with GLib 2.40.2, without SMI, without c-ares, without ADNS,
without
Lua, with GnuTLS 2.12.23, with Gcrypt 1.5.3, with MIT Kerberos, without GeoIP.

Running on Linux 4.2.0-27-generic, with locale en_US.UTF-8, with libpcap
version
1.5.3, with libz 1.2.8, with GnuTLS 2.12.23, with Gcrypt 1.5.3.
        Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz (with SSE4.2)

Built using gcc 4.8.4.
--
when http server port use not standard port , tshark only check HTTP/1.1 

#0  dissect_http_heur_tcp (tvb=0xf104a0, pinfo=0x10156c8, tree=0xf5c4d0,
data="" at packet-http.c:3010
#1  0x00007ffff3f43089 in dissector_try_heuristic (sub_dissectors=0xd841c0,
tvb=0xf104a0, pinfo=0x10156c8, tree=0xf5c4d0, heur_dtbl_entry=0x7fffffffcb70,
data=""
    at packet.c:2178
#2  0x00007ffff495a653 in decode_tcp_ports (tvb=0xf10450, offset=32,
pinfo=0x10156c8, tree=0xf5c4d0, src_port=26605, dst_port=8082,
tcpd=0x7fffebee5310, tcpinfo=0x7fffffffcfb0)
    at packet-tcp.c:4636
#3  0x00007ffff495a8e7 in process_tcp_payload (tvb=0xf10450, offset=32,
pinfo=0x10156c8, tree=0xf5c4d0, tcp_tree=0x7fffecbe9390, src_port=26605,
dst_port=8082, seq=0, nxtseq=0, 
    is_tcp_segment=0, tcpd=0x7fffebee5310, tcpinfo=0x7fffffffcfb0) at
packet-tcp.c:4682
#4  0x00007ffff4954fc0 in desegment_tcp (tvb=0xf10450, pinfo=0x10156c8,
offset=32, seq=1, nxtseq=343, sport=26605, dport=8082, tree=0xf5c4d0,
tcp_tree=0x7fffecbe9390, 
    tcpd=0x7fffebee5310, tcpinfo=0x7fffffffcfb0) at packet-tcp.c:2270
#5  0x00007ffff495ab21 in dissect_tcp_payload (tvb=0xf10450, pinfo=0x10156c8,
offset=32, seq=1, nxtseq=343, sport=26605, dport=8082, tree=0xf5c4d0,
tcp_tree=0x7fffecbe9390, 
    tcpd=0x7fffebee5310, tcpinfo=0x7fffffffcfb0) at packet-tcp.c:4749
#6  0x00007ffff495e3fc in dissect_tcp (tvb=0xf10450, pinfo=0x10156c8,
tree=0xf5c4d0) at packet-tcp.c:5656
#7  0x00007ffff3f40a8e in call_dissector_through_handle (handle=0x7fffed1ea0a0,
tvb=0xf10450, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:620
#8  0x00007ffff3f40c35 in call_dissector_work (handle=0x7fffed1ea0a0,
tvb=0xf10450, pinfo_arg=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data="" at packet.c:706
#9  0x00007ffff3f4186f in dissector_try_uint_new (sub_dissectors=0xdec460,
uint_val=6, tvb=0xf10450, pinfo=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data=""
    at packet.c:1163
#10 0x00007ffff44981e5 in ip_try_dissect (heur_first=0, tvb=0xf10450,
pinfo=0x10156c8, tree=0xf5c4d0, iph=0x7fffebce3030) at packet-ip.c:2000
#11 0x00007ffff449a104 in dissect_ip_v4 (tvb=0xf10400, pinfo=0x10156c8,
parent_tree=0xf5c4d0) at packet-ip.c:2495
#12 0x00007ffff3f40a8e in call_dissector_through_handle (handle=0x7fffed28be30,
tvb=0xf10400, pinfo=0x10156c8, tree=0xf5c4d0, data="" at packet.c:620
#13 0x00007ffff3f40c35 in call_dissector_work (handle=0x7fffed28be30,
tvb=0xf10400, pinfo_arg=0x10156c8, tree=0xf5c4d0, add_proto_name=1, data=""
at packet.c:706
#14 0x00007ffff3f4186f in dissector_try_uint_new (sub_dissectors=0xc5d130,
uint_val=2048, tvb=0xf10400, pinfo=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data="" at packet.c:1163
#15 0x00007ffff3f418d2 in dissector_try_uint (sub_dissectors=0xc5d130,
uint_val=2048, tvb=0xf10400, pinfo=0x10156c8, tree=0xf5c4d0) at packet.c:1189
#16 0x00007ffff42efea9 in dissect_ethertype (tvb=0x1015060, pinfo=0x10156c8,
tree=0xf5c4d0, data="" at packet-ethertype.c:308
#17 0x00007ffff3f40a70 in call_dissector_through_handle (handle=0x7fffed19e390,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:618
#18 0x00007ffff3f40c35 in call_dissector_work (handle=0x7fffed19e390,
tvb=0x1015060, pinfo_arg=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data="" at packet.c:706
#19 0x00007ffff3f43934 in call_dissector_only (handle=0x7fffed19e390,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:2550
#20 0x00007ffff3f43977 in call_dissector_with_data (handle=0x7fffed19e390,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:2563
#21 0x00007ffff42ee70f in dissect_eth_common (tvb=0x1015060, pinfo=0x10156c8,
parent_tree=0xf5c4d0, fcs_len=-1) at packet-eth.c:545
#22 0x00007ffff42ef24e in dissect_eth (tvb=0x1015060, pinfo=0x10156c8,
tree=0xf5c4d0, data="" at packet-eth.c:841
#23 0x00007ffff3f40a70 in call_dissector_through_handle (handle=0x7fffed2761e0,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at packet.c:618
#24 0x00007ffff3f40c35 in call_dissector_work (handle=0x7fffed2761e0,
tvb=0x1015060, pinfo_arg=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data="" at packet.c:706
#25 0x00007ffff3f4186f in dissector_try_uint_new (sub_dissectors=0xc5d470,
uint_val=1, tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data=""
    at packet.c:1163
#26 0x00007ffff4334e0b in dissect_frame (tvb=0x1015060, pinfo=0x10156c8,
parent_tree=0xf5c4d0, data="" at packet-frame.c:499
#27 0x00007ffff3f40a70 in call_dissector_through_handle (handle=0x7fffed19fc90,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:618
#28 0x00007ffff3f40c35 in call_dissector_work (handle=0x7fffed19fc90,
tvb=0x1015060, pinfo_arg=0x10156c8, tree=0xf5c4d0, add_proto_name=1,
data="" at packet.c:706
#29 0x00007ffff3f43934 in call_dissector_only (handle=0x7fffed19fc90,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:2550
#30 0x00007ffff3f43977 in call_dissector_with_data (handle=0x7fffed19fc90,
tvb=0x1015060, pinfo=0x10156c8, tree=0xf5c4d0, data="" at
packet.c:2563
#31 0x00007ffff3f4043b in dissect_record (edt=0x10156b0, file_type_subtype=1,
phdr=0xff4790, tvb=0x1015060, fd=0x7fffffffdfb0, cinfo=0x649370 <cfile+528>) at
packet.c:498
#32 0x00007ffff3f32268 in epan_dissect_run_with_taps (edt=0x10156b0,
file_type_subtype=1, phdr=0xff4790, tvb=0x1015060, fd=0x7fffffffdfb0,
cinfo=0x649370 <cfile+528>) at epan.c:345
#33 0x0000000000416abc in process_packet (cf=0x649160 <cfile>, edt=0x10156b0,
offset=286, whdr=0xff4790, pd=0xff9650 "", tap_flags=0) at tshark.c:3741
---Type <return> to continue, or q <return> to quit---q


to fix it ,I think just check HTTP/1.

~:~/data/src/wireshark-2.0.5$ diff ./epan/dissectors/packet-http.c
./epan/dissectors/packet-http.c.bak
3026c3026
<     if((tvb_strncaseeql(tvb, linelen-8, "HTTP/1.", 7) ==
0)||(tvb_strncaseeql(tvb, 0, "HTTP/1.", 7) == 0)){
---
> 	if((tvb_strncaseeql(tvb, linelen-8, "HTTP/1.1", 8) == 0)||(tvb_strncaseeql(tvb, 0, "HTTP/1.1", 8) == 0)){
wbsong@ub


You are receiving this mail because:
  • You are watching all bug changes.