http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1989
Summary: Don't stop dissection at malformed ASN.1 BER CHOICE of
zero length
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: wireshark@xxxxxxx
Build Information:
wireshark 0.99.7 (SVN Rev 23447)
--
I'm evaluating the implementation of a protocol where the BER ASN.1 CHOICE
sometimes is of zero length. This clearly violates the ASN.1 standard which
does not allow this. The dissection of the packet stops at this point and shows
a "Malformed Packet" error.
It might benefit a user - not developing the application producing the packet
but just evaluating it - when the dissection does not stop there but continues
and only informs that there was something wrong.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.