Ethereal-users: Re: [Ethereal-users] Interesting packet capture which crashes Ethereal

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: "Martin Regner" <martin.regner@xxxxxxxxx>
Date: Wed, 21 Jul 2004 20:01:05 +0200
John Lindsay wrote:
> The attached capture file will crash Ethereal under Win XP when you
> attempt to load it.
>
> The capture was taken while using the FireFly IP Softphone.  FireFly say
> they have extended IAXv2 and I suspect this may be tickling something.
> The text window of Ethereal reports protocol errors with IAX.

I got this backtrace dump:

iax2_get_packet_data_for_minipacket(_packet_info * 0x018b70b0, unsigned short 16274, int 0) line 1313 + 20 bytes
dissect_minipacket(tvbuff * 0x01cf50bc, unsigned int 2, unsigned short 16274, _packet_info * 0x018b70b0, _proto_node *
0x02350f20, _proto_node * 0x02350ba8) line 1363 + 16 bytes
dissect_iax2(tvbuff * 0x01cf50bc, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8) line 864 + 30 bytes
call_dissector_through_handle(dissector_handle * 0x01928d98, tvbuff * 0x01cf50bc, _packet_info * 0x018b70b0, _proto_node
* 0x02350ba8) line 363 + 18 bytes
call_dissector_work(dissector_handle * 0x01928d98, tvbuff * 0x01cf50bc, _packet_info * 0x018b70b0, _proto_node *
0x02350ba8) line 513 + 21 bytes
dissector_try_port(dissector_table * 0x01981630, unsigned int 4569, tvbuff * 0x01cf50bc, _packet_info * 0x018b70b0,
_proto_node * 0x02350ba8) line 776 + 21 bytes
decode_udp_ports(tvbuff * 0x01cf5088, int 8, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8, int 4569, int 4569,
int 62) line 132 + 34 bytes
dissect_udp(tvbuff * 0x01cf5088, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8) line 289 + 58 bytes
call_dissector_through_handle(dissector_handle * 0x019a5878, tvbuff * 0x01cf5088, _packet_info * 0x018b70b0, _proto_node
* 0x02350ba8) line 363 + 18 bytes
call_dissector_work(dissector_handle * 0x019a5878, tvbuff * 0x01cf5088, _packet_info * 0x018b70b0, _proto_node *
0x02350ba8) line 513 + 21 bytes
dissector_try_port(dissector_table * 0x0193eb00, unsigned int 17, tvbuff * 0x01cf5088, _packet_info * 0x018b70b0,
_proto_node * 0x02350ba8) line 776 + 21 bytes
dissect_ip(tvbuff * 0x01cf5054, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8) line 1098 + 33 bytes
call_dissector_through_handle(dissector_handle * 0x0193ec38, tvbuff * 0x01cf5054, _packet_info * 0x018b70b0, _proto_node
* 0x02350ba8) line 363 + 18 bytes
call_dissector_work(dissector_handle * 0x0193ec38, tvbuff * 0x01cf5054, _packet_info * 0x018b70b0, _proto_node *
0x02350ba8) line 513 + 21 bytes
dissector_try_port(dissector_table * 0x01907210, unsigned int 2048, tvbuff * 0x01cf5054, _packet_info * 0x018b70b0,
_proto_node * 0x02350ba8) line 776 + 21 bytes
ethertype(unsigned short 2048, tvbuff * 0x01cf5020, int 14, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8,
_proto_node * 0x02350b60, int 3472, int 3474, int -1) line 178 + 34 bytes
dissect_eth_common(tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8, int -1) line 293 + 48 bytes
dissect_eth_maybefcs(tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8) line 387 + 26 bytes
call_dissector_through_handle(dissector_handle * 0x01999370, tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node
* 0x02350ba8) line 363 + 18 bytes
call_dissector_work(dissector_handle * 0x01999370, tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node *
0x02350ba8) line 513 + 21 bytes
dissector_try_port(dissector_table * 0x01911840, unsigned int 1, tvbuff * 0x01cf5020, _packet_info * 0x018b70b0,
_proto_node * 0x02350ba8) line 776 + 21 bytes
dissect_frame(tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8) line 185 + 34 bytes
call_dissector_through_handle(dissector_handle * 0x019118c0, tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node
* 0x02350ba8) line 363 + 18 bytes
call_dissector_work(dissector_handle * 0x019118c0, tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node *
0x02350ba8) line 513 + 21 bytes
call_dissector(dissector_handle * 0x019118c0, tvbuff * 0x01cf5020, _packet_info * 0x018b70b0, _proto_node * 0x02350ba8)
line 1614 + 21 bytes
dissect_packet(_epan_dissect_t * 0x018b70a8, wtap_pseudo_header * 0x0236c08c, const unsigned char * 0x02371c40,
_frame_data * 0x02394f04, _column_info * 0x00d2c1ec) line 311 + 32 bytes
epan_dissect_run(_epan_dissect_t * 0x018b70a8, void * 0x0236c08c, const unsigned char * 0x02371c40, _frame_data *
0x02394f04, _column_info * 0x00d2c1ec) line 153 + 25 bytes
add_packet_to_packet_list(_frame_data * 0x02394f04, _capture_file * 0x00d1c0c0, wtap_pseudo_header * 0x0236c08c, const
unsigned char * 0x02371c40, int 1) line 806 + 31 bytes
read_packet(_capture_file * 0x00d1c0c0, long 39317) line 952 + 23 bytes
cf_read(_capture_file * 0x00d1c0c0) line 440 + 13 bytes
file_open_ok_cb(_GtkWidget * 0x01d42460, void * 0x01d42460) line 676 + 10 bytes
file_open_cmd(_GtkWidget * 0x018c2ae0) line 556 + 18 bytes
file_open_cmd_cb(_GtkWidget * 0x018c2ae0, void * 0x00000000) line 612 + 9 bytes
LIBGTK-WIN32-2.0-0! 00f5a6e8()
LIBGOBJECT-2.0-0! 01199389()
LIBGOBJECT-2.0-0! 01183d7c()
LIBGOBJECT-2.0-0! 0119901c()
LIBGOBJECT-2.0-0! 011981ba()
LIBGOBJECT-2.0-0! 01198456()
LIBGTK-WIN32-2.0-0! 010e81c7()
LIBGTK-WIN32-2.0-0! 00f9715f()
LIBGTK-WIN32-2.0-0! 00f9620c()
LIBGTK-WIN32-2.0-0! 00f8e3f9()
LIBGTK-WIN32-2.0-0! 00f7f28a()
LIBGOBJECT-2.0-0! 01184529()
LIBGOBJECT-2.0-0! 01183d7c()
LIBGOBJECT-2.0-0! 01198b5e()
LIBGOBJECT-2.0-0! 01197fac()
LIBGOBJECT-2.0-0! 01198456()
LIBGTK-WIN32-2.0-0! 010e7fcb()
LIBGTK-WIN32-2.0-0! 00f7b43c()
LIBGTK-WIN32-2.0-0! 00f7aa36()
LIBGDK-WIN32-2.0-0! 01231b7e()
LIBGLIB-2.0-0! 0033dcc3()
LIBGLIB-2.0-0! 0033e48b()
LIBGLIB-2.0-0! 0033a5e1()
LIBGTK-WIN32-2.0-0! 00f7a660()
main(int 0, char * * 0x012d4184) line 2536
WinMain(HINSTANCE__ * 0x00400000, HINSTANCE__ * 0x00000000, char * 0x001423b0, int 1) line 2576 + 23 bytes
ETHEREAL! WinMainCRTStartup + 308 bytes
KERNEL32! 77e814c7()