Wireshark-bugs: [Wireshark-bugs] [Bug 2687] Failure to dissect long SASL wrapped LDAP response
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2687
Yaniv Kaul <mykaul@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
--- Comment #8 from Yaniv Kaul <mykaul@xxxxxxxxx> 2008-09-25 05:08:38 PDT ---
Looking at the code at
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ldap.c?revision=25942&view=markup
as well as the commit diff
(http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ldap.c?r1=24838&r2=25890
) pretty much shows that the core of this change, using LDAP_SASL_MAX_BUF in
packet-ldap.c was NOT committed.
Therefore I'm re-opening the bug. Specifically, I've also set it to be 4*64K
(whereas the previous value was 64K).
Perhaps the correct fix is not in packet-ldap.c (which I understand is created
automatically), but I'd still be happy to see it fixed.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.