Bug ID |
9193
|
Summary |
c1222 dissector has wrong tag value for BER-encoding of calling_AE_qualifier
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
TShark 1.11.0 (SVN Rev 52168 from /trunk)
Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.36.3, with libpcap, with libz 1.2.7, with POSIX
capabilities (Linux), without libnl, without SMI, without c-ares, without ADNS,
with Lua 5.1, without Python, with GnuTLS 3.1.11, with Gcrypt 1.5.3, with MIT
Kerberos, with GeoIP.
Running on Linux 3.10.11-200.fc19.x86_64, with locale en_US.utf8, with libpcap
version 1.4.0, with libz 1.2.7.
Intel(R) Core(TM) i5-2540M CPU @ 2.60GHz
Built using gcc 4.8.1 20130603 (Red Hat 4.8.1-1).
--
When using the cryptographic routines in C12.22, one of the tags that may be
present is the calling_AE_qualifier field which has a tag value of 0xA7 as per
ASN.1 BER, but is incorrectly listed in the canonifyTable structure as having a
value of 0xA3. The effect is that any encrypted or authenticated packet
containing this field will fail to be correctly decrypted or authenticated by
the dissector until this is fixed.
You are receiving this mail because:
- You are watching all bug changes.