Wireshark-bugs: [Wireshark-bugs] [Bug 2239] New: bluetooth L2CAP dissector decoding errors
Date: Fri, 1 Feb 2008 17:28:56 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2239

           Summary: bluetooth L2CAP dissector decoding errors
           Product: Wireshark
           Version: SVN
          Platform: PC
        OS/Version: Windows XP
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: shane.kearns@xxxxxxxxxxx
        Depends on: 2237



shane kearns <shane.kearns@xxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #1430|                            |review_for_checkin?
               Flag|                            |


Created an attachment (id=1430)
 --> (http://bugs.wireshark.org/bugzilla/attachment.cgi?id=1430)
patch to fix the bug

Build Information:
wireshark 0.99.8-btsnoop-dev (SVN Rev 24241)

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.12.6, with GLib 2.14.5, with WinPcap (version unknown),
with libz 1.2.3, with libpcre 6.4, with SMI 0.4.5, with ADNS, with Lua 5.1,
with

GnuTLS 1.6.1, with Gcrypt 1.2.3, with MIT Kerberos, with PortAudio PortAudio
V19-devel, with AirPcap.

Running on Windows XP Service Pack 2, build 2600, with WinPcap version 4.0.1
(packet.dll version 4.0.0.901), based on libpcap version 0.9.5, without
AirPcap.


Built using Microsoft Visual C++ 6.0


Press any key to exit
--
L2CAP dissector is missing retransmission & flow control modes (these were
introduces in BT 1.2 specification)
Configuration commands were not fully decoded because of a bigend/littleend
issue
L2CAP commands had the wrong length set to the protocol tree by reading from
the wrong buffer offset
Also the dissect_options() function consumes all remaining data in the L2CAP
packet, which prevents decoding of other commands which follow a config
request/config response in the same packet.

Test case is the H4 format log from bug 2237, so I've added that as a
dependency.
The bug and fix itself is independent.


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.