Wireshark-bugs: [Wireshark-bugs] [Bug 5460] New: MongoDB dissector improperly decodes cursorID i

Date: Wed, 1 Dec 2010 22:42:10 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5460

           Summary: MongoDB dissector improperly decodes cursorID in
                    OP_KILL_CURSORS command
           Product: Wireshark
           Version: SVN
          Platform: Other
        OS/Version: FreeBSD
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: stas@xxxxxxxxxxx


Created an attachment (id=5558)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5558)
Patch

Build Information:
wireshark 1.5.0 (SVN Rev 35086 from /trunk)

Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.22.1, with GLib 2.26.1, with libpcap 1.0.0, with
libz 1.2.5, without POSIX capabilities, without libpcre, with SMI 0.4.8,
without
c-ares, with ADNS, without Lua, without Python, with GnuTLS 2.8.6, with Gcrypt
1.4.6, without Kerberos, with GeoIP, without PortAudio, without AirPcap.

Running on FreeBSD 9.0-CURRENT, with libpcap version 1.0.0, with libz 1.2.5,
GnuTLS 2.8.6, Gcrypt 1.4.6.

Built using gcc 4.2.1 20070719  [FreeBSD].
--
MongoDB dissector improperly decodes cursorID in OP_KILL_CURSORS command.
The size of the CursorID is 64 bits, while the code assumes they are 4 bits,
though correctly incrementing the pointer.  I believe it's a typo.
The description of OP_KILL_CURSORS command can be found here:

http://www.mongodb.org/display/DOCS/Mongo+Wire+Protocol

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.