Wireshark-bugs: [Wireshark-bugs] [Bug 10011] New: OpenFlow 1.3 OXM field OXM_OF_IPV6_ND_SLL inco
Bug ID |
10011
|
Summary |
OpenFlow 1.3 OXM field OXM_OF_IPV6_ND_SLL incorrectly dissected (128 bits read instead of 48)
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
1.11.x (Experimental)
|
Hardware |
x86-64
|
OS |
Windows 8.1
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
vsulak.svk@gmail.com
|
Created attachment 12714 [details]
caputre with a packet showing incorrect dissection
Build Information:
Version 1.11.3 (v1.11.3-0-g1dd5d3a from master)
Compiled (64-bit) with GTK+ 2.24.14, with Cairo 1.10.2, with Pango 1.30.1, with
GLib 2.34.1, with WinPcap (4_1_3), with libz 1.2.5, with SMI 0.4.8, with c-ares
1.9.1, with Lua 5.2, without Python, with GnuTLS 2.12.18, with Gcrypt 1.4.6,
without Kerberos, with GeoIP, with PortAudio V19-devel (built Apr 15 2014),
with
AirPcap.
Running on 64-bit Windows 8.1, build 9600, with WinPcap version 4.1.3
(packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b
--
Dissection of OXM_OF_IPV6_ND_SLL triggers "malformed packet" comment in packet
list since it makes dissecting of further OXM fields impossible.
It is possible that similar issue will be with OXM_OF_IPV6_ND_TLL since its
dissecting is basically the same.
You are receiving this mail because:
- You are watching all bug changes.