https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6471
Summary: wireshark unable to
Product: Wireshark
Version: 1.4.6
Platform: Other
OS/Version: All
Status: NEW
Severity: Major
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: paitken@xxxxxxxxx
Created an attachment (id=7267)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7267)
netflow options data with 16-byte system ID as scope
Build Information:
wireshark 1.4.6
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.4, with GLib 2.28.6, with libpcap 1.1.1, with
libz 1.2.3.4, with POSIX capabilities (Linux), without libpcre, with SMI 0.4.8,
with c-ares 1.7.3, with Lua 5.1, without Python, with GnuTLS 2.8.6, with Gcrypt
1.4.6, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built Mar 18
2011 15:44:36), without AirPcap.
Running on Linux 2.6.38-12-generic, with libpcap version 1.1.1, with libz
1.2.3.4, GnuTLS 2.8.6, Gcrypt 1.4.6.
Built using gcc 4.5.2.
--
Wireshark fails to decode NetFlow options which have system scope size != 4
bytes, although no such size is specified in RFC 3954.
Wireshark fails with:
[Dissector bug, protocol CFLOW: proto.c:1299: failed assertion "length == 4"]
[Expert Info (Error/Malformed): proto.c:1299: failed assertion "length ==
4"]
[Message: proto.c:1299: failed assertion "length == 4"]
[Severity level: Error]
[Group: Malformed]
Since no particular size is specified in RFC3954, the dissector should respect
the size in the received template and should not assert.
The attachment shows netflow options data with 16-byte system ID as scope.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.