| Bug ID |
9983
|
| Summary |
3f81af22e0 (Improved TLS/DTLS Heartbeat Message handling.) -
|
| Classification |
Unclassified
|
| Product |
Wireshark
|
| Version |
Git
|
| Hardware |
x86
|
| OS |
All
|
| Status |
UNCONFIRMED
|
| Severity |
Major
|
| Priority |
Low
|
| Component |
Wireshark
|
| Assignee |
[email protected]
|
| Reporter |
[email protected]
|
Created attachment 12689 [details]
ssl stream with heartbleed check
Build Information:
tfoerste@n22 ~/devel/wireshark $ ./tshark -v
TShark 1.11.3 (wireshark-1.11.3-rc1-2335-gb642a28 from master)
Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GLib 2.38.2, with libpcap, with libz 1.2.8, with POSIX
capabilities (Linux), with libnl 3, without SMI, without c-ares, without ADNS,
with Lua 5.1, without Python, with GnuTLS 2.12.23, with Gcrypt 1.5.3, without
Kerberos, with GeoIP.
Running on Linux 3.13.9, with locale en_US.utf8, with libpcap version 1.3.0,
with libz 1.2.8.
Built using gcc 4.7.3.
--
I tested latest git with that commit and the attached script with :
$>perl check-ssl-heartbleed.pl boinc.berkeley.edu
but got just a malformed packet.
You are receiving this mail because:
- You are watching all bug changes.