Wireshark-bugs: [Wireshark-bugs] [Bug 6660] New: ICMPv6 DNSSL option malformed on padding
Date: Sat, 10 Dec 2011 09:11:30 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6660

           Summary: ICMPv6 DNSSL option malformed on padding
           Product: Wireshark
           Version: 1.6.4
          Platform: Other
        OS/Version: NetBSD
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: roy@xxxxxxxxxxxx


Created an attachment (id=7559)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7559)
Report padding used by DNSSL correctly

Build Information:
uberlaptop$ tshark -v
TShark 1.6.4 (SVN Rev Unknown from unknown)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GLib 2.28.8, with libpcap 1.1.1, with libz 1.2.3,
without
POSIX capabilities, with libpcre (version unknown), with SMI 0.4.8, without
c-ares, without ADNS, with Lua 5.1, without Python, with GnuTLS 2.12.14, with
Gcrypt 1.5.0, with Heimdal Kerberos, without GeoIP.

Running on NetBSD 5.99.58, with libpcap version 1.1.1, with libz 1.2.3.

Built using gcc 4.5.3.

--
ICMPv6 DNSSL option is reported malformed because it does not skip padding
correctly. Attached is a patch to fix this issue.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.