https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3422
--- Comment #5 from Jaap Keuter <jaap.keuter@xxxxxxxxx> 2009-04-20 12:32:15 PDT ---
(In reply to comment #4)
> I'm little unclear on the first part of your comment. Do you mean that
> tvb_get_ptr might produce a pointer to a buffer that doesn't have 'length'
> bytes?
I guess it will, but how are we to be sure the code respects length? Other than
reviewing all possible code paths and fuzztest it with (non-available) samples
captures.
To avoid all this work the safe tvb access functions were created. This will
gracefully handle these accesses, however flawed they are.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.