Wireshark-bugs: [Wireshark-bugs] [Bug 5546] Got error "Malformed Packets" on decoding SCTP init
Date: Tue, 4 Jan 2011 19:42:34 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5546 --- Comment #4 from Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> 2011-01-04 19:42:33 PST --- Rev 35368 allows the SCTP dissector to go even further, decoding parameters until it runs out of data. Now it says this about that first packet: Stream Control Transmission Protocol, Src Port: 34119 (34119), Dst Port: 20000 (20000) Source port: 34119 Destination port: 20000 Verification tag: 0x00000000 Checksum: 0x2dd0b7fc (not verified) INIT chunk (Outbound streams: 5, inbound streams: 5) Chunk type: INIT (1) 0... .... = Bit: Stop processing of the packet .0.. .... = Bit: Do not report Chunk flags: 0x00 Chunk length: 108 [Expert Info (Error/Malformed): Chunk length (108) is longer than remaining data (100) in the packet] [Message: Chunk length (108) is longer than remaining data (100) in the packet] [Severity level: Error] [Group: Malformed] Initiate tag: 0x9f25ef61 Advertised receiver window credit (a_rwnd): 2097152 Number of outbound streams: 5 Number of inbound streams: 5 Initial TSN: 2271736697 IPv4 address parameter (Address: 192.168.216.254) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 192.168.216.254 (192.168.216.254) IPv4 address parameter (Address: 10.102.0.1) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 10.102.0.1 (10.102.0.1) IPv4 address parameter (Address: 10.10.11.199) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 10.10.11.199 (10.10.11.199) IPv4 address parameter (Address: 10.105.0.1) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 10.105.0.1 (10.105.0.1) IPv4 address parameter (Address: 192.168.63.1) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 192.168.63.1 (192.168.63.1) IPv4 address parameter (Address: 172.16.0.1) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 172.16.0.1 (172.16.0.1) IPv4 address parameter (Address: 10.0.1.202) Parameter type: IPv4 address (0x0005) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 8 IP Version 4 address: 10.0.1.202 (10.0.1.202) Supported address types parameter (Supported types: IPv4) Parameter type: Supported address types (0x000c) 0... .... .... .... = Bit: Stop processing of chunk .0.. .... .... .... = Bit: Do not report Parameter length: 6 Supported address type: IPv4 address (5) Parameter padding: 0000 ECN parameter Parameter type: ECN (0x8000) 1... .... .... .... = Bit: Skip parameter and continue processing of the chunk .0.. .... .... .... = Bit: Do not report Parameter length: 4 Supported Extensions parameter (Supported types: ASCONF, ASCONF_ACK) Parameter type: Supported Extensions (0x8008) 1... .... .... .... = Bit: Skip parameter and continue processing of the chunk .0.. .... .... .... = Bit: Do not report Parameter length: 6 Supported chunk type: ASCONF (193) Supported chunk type: ASCONF_ACK (128) Parameter padding: 0000 Forward TSN supported parameter Parameter type: Forward TSN supported (0xc000) 1... .... .... .... = Bit: Skip parameter and continue processing of the chunk .1.. .... .... .... = Bit: Do report Parameter length: 4 [Malformed Packet: SCTP] [Expert Info (Error/Malformed): Malformed Packet (Exception occurred)] [Message: Malformed Packet (Exception occurred)] [Severity level: Error] [Group: Malformed] -- Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.
- References:
- Prev by Date: [Wireshark-bugs] [Bug 5546] Got error "Malformed Packets" on decoding SCTP init packet
- Next by Date: [Wireshark-bugs] [Bug 3933] SCCPS (Secure Skinny) & Secure RTP
- Previous by thread: [Wireshark-bugs] [Bug 5546] Got error "Malformed Packets" on decoding SCTP init packet
- Next by thread: [Wireshark-bugs] [Bug 5547] New: TSHARK ring buffering stopped
- Index(es):