Bug ID |
10958
|
Summary |
NHRP dissector incorrect decode nhrp.client.protocol.addr shows 0.0.0.0
|
Product |
Wireshark
|
Version |
1.6.7
|
Hardware |
x86
|
OS |
Ubuntu
|
Status |
UNCONFIRMED
|
Severity |
Minor
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 13445 [details]
NHRP registration and registration response with the error
Build Information:
Version 1.6.7
Copyright 1998-2012 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.24.10, with GLib 2.32.0, with libpcap (version
unknown), with libz 1.2.3.4, with POSIX capabilities (Linux), without libpcre,
with SMI 0.4.8, with c-ares 1.7.5, with Lua 5.1, without Python, with GnuTLS
2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with PortAudio
V19-devel (built Dec 10 2011 11:43:10), without AirPcap.
Running on Linux 3.8.0-44-generic, with libpcap version 1.1.1, with libz
1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0.
Built using gcc 4.6.3.
--
The client protocol address field (nhrp.client.protocol.addr) decodes to
0.0.0.0 yet 4 bytes selected in the packet byte window are 0x9b 0x01 0x92 0x06
or 155.1.146.6 - I believe this is wrong!
You are receiving this mail because:
- You are watching all bug changes.