Wireshark-bugs: [Wireshark-bugs] [Bug 2630] rtp_player crashes on decode of long call: BadAlloc
Date: Fri, 11 Oct 2013 13:17:33 +0000

Comment # 14 on bug 2630 from
Created attachment 11765 [details]
Here is an example capture file, and gdb backtrace

Here is another example of the problem - it was reproduced using the latest
1.10.2 wireshark on CentOS 6.4.  The steps to reproduce the problem are: open
the included .pcap file, go to "Telephony", "RTP", "Show all streams".  When
the window pops up, select the stream with a source IP of "67.221.121.114" and
click the "Find Reverse" button.  This should highlight the 27,065 packet
stream as well.  Then click the "Analyze" button and wait for it to complete. 
When it has completed, click the "Player" button and then click "Decode"
button.  Wireshark will then process the operation and promptly crash when it
tries to display the result.


You are receiving this mail because:
  • You are the assignee for the bug.
  • You are watching all bug changes.