Wireshark-bugs: [Wireshark-bugs] [Bug 1566] New: SIP parse error of the Via header
Date: Wed, 25 Apr 2007 10:28:25 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1566 Summary: SIP parse error of the Via header Product: Wireshark Version: 0.99.5 Platform: PC OS/Version: Windows XP Status: NEW Severity: Major Priority: Medium Component: Wireshark AssignedTo: wireshark-bugs@xxxxxxxxxxxxx ReportedBy: orid@xxxxxxxxxxxx Build Information: Version 0.99.5 (SVN Rev 20677) Copyright 1998-2007 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Compiled with GTK+ 2.10.7, with GLib 2.12.7, with WinPcap (version unknown), with libz 1.2.3, with libpcre 6.4, with Net-SNMP 5.4, with ADNS, with Lua 5.1, with GnuTLS 1.6.1, with Gcrypt 1.2.3, with MIT Kerberos, with PortAudio PortAudio V19-devel, with AirPcap. Running on Windows XP Service Pack 2, build 2600, with WinPcap version 4.0 (packet.dll version 4.0.0.755), based on libpcap version 0.9.5, without AirPcap. Built using Microsoft Visual C++ 6.0 build 8804 Wireshark is Open Source Software released under the GNU General Public License. Check the man page and http://www.wireshark.org for more information. -- Some SIP packets are not analyzed correctly, and ended with the error "[Malformed Packet: SIP]", although the packet is legal. I suspect Wireshark does not parse correctly packets with the Via header when the "received" and "rport" properties appear. Example of such packet: No. Time Source Destination Protocol Info 469 14:28:51.160473 62.90.236.36 10.1.6.171 SIP Status: 200 OK[Malformed Packet] Frame 469 (631 bytes on wire, 631 bytes captured) Ethernet II, Src: JuniperN_40:7c:e0 (00:14:f6:40:7c:e0), Dst: Ibm_cd:e8:43 (00:0d:60:cd:e8:43) Internet Protocol, Src: 62.90.236.36 (62.90.236.36), Dst: 10.1.6.171 (10.1.6.171) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) Total Length: 617 Identification: 0x7b4d (31565) Flags: 0x00 Fragment offset: 0 Time to live: 113 Protocol: UDP (0x11) Header checksum: 0x910c [correct] Source: 62.90.236.36 (62.90.236.36) Destination: 10.1.6.171 (10.1.6.171) User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 32828 (32828) Session Initiation Protocol Status-Line: SIP/2.0 200 OK Status-Code: 200 Message Header From: "Gilad"<sip:[email protected]>;tag=ba618766 SIP Display info: "Gilad" SIP from address: sip:[email protected] SIP tag: ba618766 To: "76119"<sip:[email protected]>;tag=10754f70-24ec5a3e-13c4-45018-17b0cd-4bbaecbd-17b0cd SIP Display info: "76119" SIP to address: sip:[email protected] SIP tag: 10754f70-24ec5a3e-13c4-45018-17b0cd-4bbaecbd-17b0cd Call-ID: NGJlNDI1OTJiYzY4MjQ4MWYwODg5NjEzNWUzYjZlOWY. CSeq: 1 INVITE Accept-Language: 7 WWW-Authenticate: 1 [Malformed Packet: SIP] 0000 00 0d 60 cd e8 43 00 14 f6 40 7c e0 08 00 45 00 ..`..C...@|...E. 0010 02 69 7b 4d 00 00 71 11 91 0c 3e 5a ec 24 0a 01 .i{M..q...>Z.$.. 0020 06 ab 13 c4 80 3c 02 55 05 65 53 49 50 2f 32 2e .....<.U.eSIP/2. 0030 30 20 32 30 30 20 4f 4b 0d 0a 46 72 6f 6d 3a 20 0 200 OK..From: 0040 22 47 69 6c 61 64 22 3c 73 69 70 3a 47 69 6c 61 "Gilad"<sip:Gila 0050 64 40 36 32 2e 39 30 2e 32 33 36 2e 33 36 3e 3b [email protected]>; 0060 74 61 67 3d 62 61 36 31 38 37 36 36 0d 0a 54 6f tag=ba618766..To 0070 3a 20 22 37 36 31 31 39 22 3c 73 69 70 3a 37 36 : "76119"<sip:76 0080 31 31 39 40 36 32 2e 39 30 2e 32 33 36 2e 33 36 [email protected] 0090 3e 3b 74 61 67 3d 31 30 37 35 34 66 37 30 2d 32 >;tag=10754f70-2 00a0 34 65 63 35 61 33 65 2d 31 33 63 34 2d 34 35 30 4ec5a3e-13c4-450 00b0 31 38 2d 31 37 62 30 63 64 2d 34 62 62 61 65 63 18-17b0cd-4bbaec 00c0 62 64 2d 31 37 62 30 63 64 0d 0a 43 61 6c 6c 2d bd-17b0cd..Call- 00d0 49 44 3a 20 4e 47 4a 6c 4e 44 49 31 4f 54 4a 69 ID: NGJlNDI1OTJi 00e0 59 7a 59 34 4d 6a 51 34 4d 57 59 77 4f 44 67 35 YzY4MjQ4MWYwODg5 00f0 4e 6a 45 7a 4e 57 55 7a 59 6a 5a 6c 4f 57 59 2e NjEzNWUzYjZlOWY. 0100 0d 0a 43 53 65 71 3a 20 31 20 49 4e 56 49 54 45 ..CSeq: 1 INVITE 0110 0d 0a 41 63 63 65 70 74 2d 4c 61 6e 67 75 61 67 ..Accept-Languag 0120 65 3a 20 37 0d 0a 57 57 57 2d 41 75 74 68 65 6e e: 7..WWW-Authen 0130 74 69 63 61 74 65 3a 20 31 0d 0a 56 69 61 3a 20 ticate: 1..Via: 0140 53 49 50 2f 32 2e 30 2f 55 44 50 20 31 30 2e 31 SIP/2.0/UDP 10.1 0150 2e 36 2e 31 37 31 3a 33 32 38 32 38 3b 72 65 63 .6.171:32828;rec 0160 65 69 76 65 64 3d 32 30 33 2e 31 38 39 2e 31 39 eived=203.189.19 0170 31 2e 32 35 31 3b 72 70 6f 72 74 3d 31 37 37 35 1.251;rport=1775 0180 38 3b 62 72 61 6e 63 68 3d 7a 39 68 47 34 62 4b 8;branch=z9hG4bK 0190 2d 64 38 37 35 34 33 2d 34 64 33 32 32 64 34 33 -d87543-4d322d43 01a0 65 65 31 31 34 39 37 65 2d 31 2d 2d 64 38 37 35 ee11497e-1--d875 01b0 34 33 2d 0d 0a 43 6f 6e 74 61 63 74 3a 20 3c 73 43-..Contact: <s 01c0 69 70 3a 37 36 31 31 39 40 36 32 2e 39 30 2e 32 ip:[email protected] 01d0 33 36 2e 33 36 3e 0d 0a 43 6f 6e 74 65 6e 74 2d 36.36>..Content- 01e0 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f Type: applicatio 01f0 6e 2f 73 64 70 0d 0a 43 6f 6e 74 65 6e 74 2d 4c n/sdp..Content-L 0200 65 6e 67 74 68 3a 20 31 30 35 0d 0a 0d 0a 76 3d ength: 105....v= 0210 30 0d 0a 6f 3d 2d 20 30 20 30 20 49 4e 20 49 50 0..o=- 0 0 IN IP 0220 34 20 36 32 2e 39 30 2e 32 33 36 2e 33 36 0d 0a 4 62.90.236.36.. 0230 73 3d 2d 0d 0a 63 3d 49 4e 20 49 50 34 20 36 32 s=-..c=IN IP4 62 0240 2e 39 30 2e 32 33 36 2e 33 36 0d 0a 74 3d 30 20 .90.236.36..t=0 0250 30 0d 0a 61 3d 73 65 6e 64 72 65 63 76 0d 0a 6d 0..a=sendrecv..m 0260 3d 61 75 64 69 6f 20 35 30 30 34 20 52 54 50 2f =audio 5004 RTP/ 0270 41 56 50 20 38 0d 0a AVP 8.. -- Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
- Follow-Ups:
- [Wireshark-bugs] [Bug 1566] SIP parse error of the Via header
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 1566] SIP parse error of the Via header
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 1566] SIP parse error of the Via header
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 1566] SIP parse error of the Via header
- Prev by Date: [Wireshark-bugs] [Bug 1565] New: Buildbot crash output: fuzz-2007-04-25-16170.pcap
- Next by Date: [Wireshark-bugs] [Bug 1566] SIP parse error of the Via header
- Previous by thread: [Wireshark-bugs] [Bug 1565] Buildbot crash output: fuzz-2007-04-25-16170.pcap
- Next by thread: [Wireshark-bugs] [Bug 1566] SIP parse error of the Via header
- Index(es):