Bug ID |
10863
|
Summary |
Malformed Packet on rsync-version with length 2
|
Product |
Wireshark
|
Version |
1.12.3
|
Hardware |
x86-64
|
OS |
Linux (other)
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 13397 [details]
malformed sample
Build Information:
Version 1.12.3 (Git Rev Unknown from unknown)
Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 3.14.7, with Cairo 1.14.0, with Pango 1.36.8, with
GLib 2.42.1, with libpcap, with libz 1.2.8, with POSIX capabilities (Linux),
with libnl 3, without SMI, without c-ares, without ADNS, with Lua 5.2, without
Python, with GnuTLS 3.3.11, with Gcrypt 1.6.2, with MIT Kerberos, without
GeoIP,
with PortAudio V19-devel (built Jan 31 2014 21:19:35), without AirPcap.
Running on Linux 3.17.6-1-ARCH, with locale de_DE.UTF-8, with libpcap version
1.6.2, with libz 1.2.8, GnuTLS 3.3.11, Gcrypt 1.6.2.
Intel(R) Core(TM) i3 CPU M 370 @ 2.40GHz
Built using gcc 4.9.2 20141224 (prerelease).
--
It seems that the dissector for rsync can't handle rsync-versions reported with
length 2.
I guess the "malformed packet"-error has something to do with the hardcoded
length of 4 on line 121 in packet-rsync.c.
Attached a sample with the answer of "29" received from a server.
You are receiving this mail because:
- You are watching all bug changes.