https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3570
Summary: fuzz testing reports possible dissector bug for protocol
sFlow.
Product: Wireshark
Version: SVN
Platform: Other
OS/Version: All
Status: NEW
Severity: Major
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: yamisoe@xxxxxxxxx
Created an attachment (id=3177)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3177)
the fuzzed capture file
Build Information:
Version 1.3.0 (SVN Rev 28767)
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.16.1, with GLib 2.20.1, with libpcap 1.0.0, with libz
1.2.3.3, without POSIX capabilities, without libpcre, without SMI, without
c-ares, without ADNS, with Lua 5.1, without Python, with GnuTLS 2.4.2, with
Gcrypt 1.4.1, without Kerberos, without GeoIP, without PortAudio, without
AirPcap.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.
Running on Linux 2.6.28-11-generic, with libpcap version 1.0.0, GnuTLS 2.4.2,
Gcrypt 1.4.1.
Built using gcc 4.3.3.
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
fuzz testing reports possible dissector bug:
19:03:58 Warn Dissector bug, protocol sFlow, in packet 321: More than
1000000 items in the tree -- possible infinite loop
19:03:58 Warn Dissector bug, protocol sFlow, in packet 376:
proto.c:3241: failed assertion "end >= fi->start"
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.