Wireshark-bugs: [Wireshark-bugs] [Bug 1087] New: Ethereal 0.10.14-16.5 & 0.10.14-16.8 segfault s
Date: Sat, 2 Sep 2006 09:31:29 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1087

           Summary: Ethereal 0.10.14-16.5 & 0.10.14-16.8 segfault sniffing
                    samba traffic
           Product: Wireshark
           Version: 0.10.14
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: Critical
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: sorensenj@xxxxxxxxx


Ethereal segfaults while sniffing in non/promiscuous mode on SuSE 10.1 fully
patched. I have rebooted and reinstalled ethereal.

ethereal 0.10.14

Copyright 1998-2005 Gerald Combs <gerald@xxxxxxxxxxxx>.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.8.10, with GLib 2.8.5, with libpcap 0.9.4, with libz
1.2.3,
with libpcre 6.4, with Net-SNMP 5.3.0.1, with ADNS.

Running with libpcap version 0.9.4 on Linux 2.6.16.21-0.13-smp.

uname -a 
Linux linux-server 2.6.16.21-0.13-smp #1 SMP Mon Jul 17 17:22:44 UTC 2006 i686
i686 i386 GNU/Linux

==Steps to reproduce==
1) Launch ethereal as root on SuSE 10.1.
2) Sniff the network (promiscuous mode it doesnt matter)
3) Use the net command to attemt to join samba to a active directory domain.
"net ads join" and a mis typing "net join ads".
4) Notice how ethereal quits "Segmentation fault".

I'm not sure what else to attach as this is my first bug crash report on linux.

mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0xb286d000
read(15, "Xcur\20\0\0\0\0\0\1\0\1\0\0\0\2\0\375\377\30\0\0\0\34\0"..., 4096) =
1312
_llseek(15, 0, [0], SEEK_SET)           = 0
read(15, "Xcur\20\0\0\0\0\0\1\0\1\0\0\0\2\0\375\377\30\0\0\0\34\0"..., 4096) =
1312
close(15)                               = 0
munmap(0xb286d000, 4096)                = 0
write(3, "\4\30\2\0z\5\340\2\4\5\2\0y\5\340\2\2\4\4\0N\0\340\2\1"..., 2020) =
2020
read(3, "\22\4&(z\5\340\2z\5\340\2\0x\227\277(x\227\277\376\270"..., 32) = 32
read(3, "\21\0&(z\5\340\2z\5\340\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 32) = 32
read(3, "\22\355\'(y\5\340\2y\5\340\2\0q\364\267 \"J\10\350w\227"..., 32) = 32
read(3, "\21\0\'(y\5\340\2y\5\340\2\320\"J\10Xx\227\277\204\357"..., 32) = 32
read(3, "\22x0(x\5\340\2x\5\340\2\0\0\0\0\230x\227\277w\220\f\10"..., 32) = 32
read(3, "\21\3219(x\5\340\2x\5\340\2hx\227\2778\355#\10\2\0\0\0"..., 32) = 32
read(3, "\21\321:(\177\5\340\2\177\5\340\2\0\234o\10Xx\227\277\204"..., 32) =
32
read(3, "\21\321;(\200\5\340\2\200\5\340\2\210\322l\10Xx\227\277"..., 32) = 32
read(3, "\23xC(\305\6\340\2\305\6\340\2\0\6\340\2\0\0\0\0\1\0\0"..., 32) = 32
read(3, "\23xG(\306\6\340\2\306\6\340\2\0\6\340\2\0\0\0\0\1\0\0"..., 32) = 32
read(3, "\1\0S(\3\0\0\0!\0\0\0\1\0\1\1\377\377\377\377\0\0\0\0\0"..., 32) = 32
read(3, "\0\0C\0\0\0C\0\0\0\0\0", 12)   = 12
read(3, "\1\30T(\0\0\0\0005\1\0\0\0\0\0\0\310\0\310\0\0\0\0\0\10"..., 32) = 32
write(3, "\3\30\2\0\305\6\340\2\16\5\2\0\305\6\340\2", 16) = 16
read(3, "\1\0U(\3\0\0\0!\0\0\0\1\0\1\1\377\377\377\377\0\0\0\0\0"..., 32) = 32
read(3, "\0\0C\0\0\0C\0\0\0\0\0", 12)   = 12
read(3, "\1\30V(\0\0\0\0005\1\0\0\0\0\0\0\310\0\310\0\0\0\0\0\10"..., 32) = 32
gettimeofday({1157187882, 80594}, NULL) = 0
gettimeofday({1157187882, 80653}, NULL) = 0
gettimeofday({1157187882, 81149}, NULL) = 0
gettimeofday({1157187882, 81484}, NULL) = 0
gettimeofday({1157187882, 81817}, NULL) = 0
gettimeofday({1157187882, 82166}, NULL) = 0
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
+++ killed by SIGSEGV +++
Process 4877 detached


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.