Bug ID |
9983
|
Summary |
3f81af22e0 (Improved TLS/DTLS Heartbeat Message handling.) -
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
Git
|
Hardware |
x86
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Wireshark
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 12689 [details]
ssl stream with heartbleed check
Build Information:
tfoerste@n22 ~/devel/wireshark $ ./tshark -v
TShark 1.11.3 (wireshark-1.11.3-rc1-2335-gb642a28 from master)
Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GLib 2.38.2, with libpcap, with libz 1.2.8, with POSIX
capabilities (Linux), with libnl 3, without SMI, without c-ares, without ADNS,
with Lua 5.1, without Python, with GnuTLS 2.12.23, with Gcrypt 1.5.3, without
Kerberos, with GeoIP.
Running on Linux 3.13.9, with locale en_US.utf8, with libpcap version 1.3.0,
with libz 1.2.8.
Built using gcc 4.7.3.
--
I tested latest git with that commit and the attached script with :
$>perl check-ssl-heartbleed.pl boinc.berkeley.edu
but got just a malformed packet.
You are receiving this mail because:
- You are watching all bug changes.