https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6660
Summary: ICMPv6 DNSSL option malformed on padding
Product: Wireshark
Version: 1.6.4
Platform: Other
OS/Version: NetBSD
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: roy@xxxxxxxxxxxx
Created an attachment (id=7559)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7559)
Report padding used by DNSSL correctly
Build Information:
uberlaptop$ tshark -v
TShark 1.6.4 (SVN Rev Unknown from unknown)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GLib 2.28.8, with libpcap 1.1.1, with libz 1.2.3,
without
POSIX capabilities, with libpcre (version unknown), with SMI 0.4.8, without
c-ares, without ADNS, with Lua 5.1, without Python, with GnuTLS 2.12.14, with
Gcrypt 1.5.0, with Heimdal Kerberos, without GeoIP.
Running on NetBSD 5.99.58, with libpcap version 1.1.1, with libz 1.2.3.
Built using gcc 4.5.3.
--
ICMPv6 DNSSL option is reported malformed because it does not skip padding
correctly. Attached is a patch to fix this issue.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.