[prev in list] [next in list] [prev in thread] [next in thread] 

List:       wireshark-bugs
Subject:    [Wireshark-bugs] [Bug 14150] New: TCP: Malformed data with Riverbed Probe option
From:       bugzilla-daemon () wireshark ! org
Date:       2017-10-29 11:13:01
Message-ID: bug-14150-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]

--15092755811.B9ED6c9c.7334
Date: Sun, 29 Oct 2017 11:13:01 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14150

            Bug ID: 14150
           Summary: TCP: Malformed data with Riverbed Probe option
           Product: Wireshark
           Version: Git
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: Normal
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-admin@wireshark.org
          Reporter: uh@heilmeier.eu
  Target Milestone: ---

Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
With 2.4.X and master TCP frames with Riverbed Probe Option (Type 76) returns
"malformed packet" after the RVBD probe option.

With WS 2.2.10 frame is dissected correct.

Furthermore SYN packets "behind" the serverside Steelhead are not marked as
"S+*".

I will try to sanitize my sample captures and upload them.


This bug may be related to Bug 14074.

-- 
You are receiving this mail because:
You are watching all bug changes.
--15092755811.B9ED6c9c.7334
Date: Sun, 29 Oct 2017 11:13:01 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated

<html>
    <head>
      <base href="https://bugs.wireshark.org/bugzilla/" />
      <style>
        body, th, td {
            font-size: 12px;
            font-family: Arial, Helvetica, sans-serif; }
        p, pre { margin-top: 1em; }
        pre {
            font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, monospace;
	    white-space: pre-wrap;
	}
        table { border: 0; border-spacing: 0; border-collapse: collapse; }
        th, td {
            padding: 0.25em;
            padding-left: 0.5em;
            padding-right: 0.5em;
        }
        th { background: rgb(240, 240, 240); }
        th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
        th.th_left { border-right: 1px solid rgb(116, 126, 147); }
        td.removed { background-color: #ffcccc; }
        td.added { background-color: #e4ffc7; }
      </style>
    </head>
    <body><table>
        <tr>
          <th class="th_left">Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_UNCONFIRMED "
   title="UNCONFIRMED - TCP: Malformed data with Riverbed Probe option"
   href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14150">14150</a>
          </td>
        </tr>

        <tr>
          <th class="th_left">Summary</th>
          <td>TCP: Malformed data with Riverbed Probe option
          </td>
        </tr>

        <tr>
          <th class="th_left">Product</th>
          <td>Wireshark
          </td>
        </tr>

        <tr>
          <th class="th_left">Version</th>
          <td>Git
          </td>
        </tr>

        <tr>
          <th class="th_left">Hardware</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th class="th_left">OS</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th class="th_left">Status</th>
          <td>UNCONFIRMED
          </td>
        </tr>

        <tr>
          <th class="th_left">Severity</th>
          <td>Normal
          </td>
        </tr>

        <tr>
          <th class="th_left">Priority</th>
          <td>Low
          </td>
        </tr>

        <tr>
          <th class="th_left">Component</th>
          <td>Dissection engine (libwireshark)
          </td>
        </tr>

        <tr>
          <th class="th_left">Assignee</th>
          <td>bugzilla-admin&#64;wireshark.org
          </td>
        </tr>

        <tr>
          <th class="th_left">Reporter</th>
          <td>uh&#64;heilmeier.eu
          </td>
        </tr>

        <tr>
          <th class="th_left">Target Milestone</th>
          <td>---
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Build Information:
Paste the COMPLETE build information from &quot;Help-&gt;About Wireshark&quot;, &quot;wireshark
-v&quot;, or &quot;tshark -v&quot;.
--
With 2.4.X and master TCP frames with Riverbed Probe Option (Type 76) returns
&quot;malformed packet&quot; after the RVBD probe option.

With WS 2.2.10 frame is dissected correct.

Furthermore SYN packets &quot;behind&quot; the serverside Steelhead are not marked as
&quot;S+*&quot;.

I will try to sanitize my sample captures and upload them.


This bug may be related to <a class="bz_bug_link 
          bz_status_INCOMPLETE "
   title="INCOMPLETE - Using Riverbed Probe filter received malformed packet Wireshark Crashed"
   href="show_bug.cgi?id=14074">Bug 14074</a>.</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are watching all bug changes.</li>
      </ul>
    </body>
</html>
--15092755811.B9ED6c9c.7334--

[Attachment #3 (text/plain)]

___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic