http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2170
------- Comment #1 from jyoung@xxxxxxx 2008-01-07 13:28 GMT -------
Your bug appears to hit an area very close to problems addressed in bug 2162
and bug 2169.
A patch for bug 2169 was applied as of SVN 24017.
A patch for bug 2162 has been submitted but not yet applied.
You might want to try a recent buildbot version of Wireshark to see if that
addresses your problem. Buildbot version of the Wireshark are available "in
the automated build section of our download area." See the links under the
"Download A Development Release" on the Wireshark Download page at:
http://www.wireshark.org/download.html
Looking at the call stack it looks like their might be another problem here.
The call stack implies uat_fld_chk_range() may have been presented with a NULL
pointer and a length of 0. I don't think this is a case the function
ep_strndup() is prepared to handle. But it looks like it should be easy
enough to reproduce your problem.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.