Wireshark-bugs: [Wireshark-bugs] [Bug 4758] Check HTTP Content-Length parsing for overflow

Date: Wed, 12 May 2010 06:27:52 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4758

Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
                 CC|                            |jeff.morriss.ws@xxxxxxxxx
         Resolution|                            |FIXED

--- Comment #2 from Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> 2010-05-12 06:27:51 PDT ---
Checked in and added to the queue for 1.2.9, thanks!

BTW I checked the other calls to strto* in the HTTP dissector and I think for
the most part they're fine without overflow checks.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.