Bug ID |
9203
|
Summary |
Bug in RTP dissector if RTP extension is present
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
x86
|
OS |
Windows 7
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Wireshark
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
Version 1.10.2 (SVN Rev 51934 from /trunk-1.10)
--
http://ask.wireshark.org/questions/25345/bug-in-rtp-dissector-if-rtp-extension-is-present
It's been a while this bug is present and it's annoying as hell to explain
everyone that it's not our code produces malformed packets but whireshark has
this bug.
Basically, when RTP extension is present wireshark shows this:
43 17:14:58.142025 10.0.105.172 64.254.226.140 RTP PT=H264,
SSRC=0xEDE18064, Seq=5, Time=0, Mark[Malformed Packet]
You are receiving this mail because:
- You are watching all bug changes.