https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2706
Summary: CFM - Incorrect parsing of Test TLV
Product: Wireshark
Version: 0.99.7
Platform: PC
OS/Version: Red Hat
Status: NEW
Severity: Minor
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: ksriram29@xxxxxxxxx
Build Information:
Version 0.99.7
Copyright 1998-2007 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.4.13, with GLib 2.4.7, with libpcap 0.8.3, with libz
1.2.1.2, without libpcre, without SMI, without ADNS, without Lua, with GnuTLS
1.0.20, with Gcrypt 1.2.0, with MIT Kerberos, without PortAudio, without
AirPcap.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.
Running on Linux 2.6.9-11.ELsmp, with libpcap version 0.8.3.
Built using gcc 3.4.3 20050227 (Red Hat 3.4.3-22.1).
--
The parsing of CFM (802.1ag / ITU-T Y.1731) Test TLV is incorrect. As per the
recommendation the test tlv length specifies the value field containing the
test pattern and CRC-32. But wireshark considers the pattern type field (1
byte) as part of the TLV length.
Attachment : test_tlv (capture file)
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.