Bug ID |
9378
|
Summary |
Fix for checking RTPS sub message length.
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
x86
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Minor
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 11997 [details]
SVN diff for packet-rtps.c
Build Information:
wireshark 1.11.1 (SVN Rev 53076 from /trunk)
Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 3.8.4, with Cairo 1.12.16, with Pango 1.32.5, with
GLib 2.38.1, with libpcap, with libz 1.2.8, without POSIX capabilities, without
libnl, without SMI, without c-ares, without ADNS, without Lua, without Python,
with GnuTLS 2.12.23, with Gcrypt 1.5.0, without Kerberos, without GeoIP,
without
PortAudio, with AirPcap.
Running on Linux 3.11.0-12-generic, with locale en_GB.UTF-8, with libpcap
version 1.4.0, with libz 1.2.8, GnuTLS 2.12.23, Gcrypt 1.5.0, without AirPcap.
Intel(R) Core(TM) i5-3470 CPU @ 3.20GHz
Built using gcc 4.8.1.
--
The rtps dissector for INFO_SRC and INFO_DST sub message types, checks for
the number of octets to the next header having the correct value. However
the version of the RTPS protocol is not used to determine the correct value
for this field. This patch adds a check for the RTPS version to check for
the correct field length.
You are receiving this mail because:
- You are watching all bug changes.