[prev in list] [next in list] [prev in thread] [next in thread]
List: wireshark-bugs
Subject: [Wireshark-bugs] [Bug 14150] New: TCP: Malformed data with Riverbed Probe option
From: bugzilla-daemon () wireshark ! org
Date: 2017-10-29 11:13:01
Message-ID: bug-14150-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]
--15092755811.B9ED6c9c.7334
Date: Sun, 29 Oct 2017 11:13:01 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14150
Bug ID: 14150
Summary: TCP: Malformed data with Riverbed Probe option
Product: Wireshark
Version: Git
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: Normal
Priority: Low
Component: Dissection engine (libwireshark)
Assignee: bugzilla-admin@wireshark.org
Reporter: uh@heilmeier.eu
Target Milestone: ---
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
With 2.4.X and master TCP frames with Riverbed Probe Option (Type 76) returns
"malformed packet" after the RVBD probe option.
With WS 2.2.10 frame is dissected correct.
Furthermore SYN packets "behind" the serverside Steelhead are not marked as
"S+*".
I will try to sanitize my sample captures and upload them.
This bug may be related to Bug 14074.
--
You are receiving this mail because:
You are watching all bug changes.
--15092755811.B9ED6c9c.7334
Date: Sun, 29 Oct 2017 11:13:01 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated
<html>
<head>
<base href="https://bugs.wireshark.org/bugzilla/" />
<style>
body, th, td {
font-size: 12px;
font-family: Arial, Helvetica, sans-serif; }
p, pre { margin-top: 1em; }
pre {
font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, monospace;
white-space: pre-wrap;
}
table { border: 0; border-spacing: 0; border-collapse: collapse; }
th, td {
padding: 0.25em;
padding-left: 0.5em;
padding-right: 0.5em;
}
th { background: rgb(240, 240, 240); }
th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
th.th_left { border-right: 1px solid rgb(116, 126, 147); }
td.removed { background-color: #ffcccc; }
td.added { background-color: #e4ffc7; }
</style>
</head>
<body><table>
<tr>
<th class="th_left">Bug ID</th>
<td><a class="bz_bug_link
bz_status_UNCONFIRMED "
title="UNCONFIRMED - TCP: Malformed data with Riverbed Probe option"
href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14150">14150</a>
</td>
</tr>
<tr>
<th class="th_left">Summary</th>
<td>TCP: Malformed data with Riverbed Probe option
</td>
</tr>
<tr>
<th class="th_left">Product</th>
<td>Wireshark
</td>
</tr>
<tr>
<th class="th_left">Version</th>
<td>Git
</td>
</tr>
<tr>
<th class="th_left">Hardware</th>
<td>All
</td>
</tr>
<tr>
<th class="th_left">OS</th>
<td>All
</td>
</tr>
<tr>
<th class="th_left">Status</th>
<td>UNCONFIRMED
</td>
</tr>
<tr>
<th class="th_left">Severity</th>
<td>Normal
</td>
</tr>
<tr>
<th class="th_left">Priority</th>
<td>Low
</td>
</tr>
<tr>
<th class="th_left">Component</th>
<td>Dissection engine (libwireshark)
</td>
</tr>
<tr>
<th class="th_left">Assignee</th>
<td>bugzilla-admin@wireshark.org
</td>
</tr>
<tr>
<th class="th_left">Reporter</th>
<td>uh@heilmeier.eu
</td>
</tr>
<tr>
<th class="th_left">Target Milestone</th>
<td>---
</td>
</tr></table>
<p>
<div>
<pre>Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
With 2.4.X and master TCP frames with Riverbed Probe Option (Type 76) returns
"malformed packet" after the RVBD probe option.
With WS 2.2.10 frame is dissected correct.
Furthermore SYN packets "behind" the serverside Steelhead are not marked as
"S+*".
I will try to sanitize my sample captures and upload them.
This bug may be related to <a class="bz_bug_link
bz_status_INCOMPLETE "
title="INCOMPLETE - Using Riverbed Probe filter received malformed packet Wireshark Crashed"
href="show_bug.cgi?id=14074">Bug 14074</a>.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>
--15092755811.B9ED6c9c.7334--
[Attachment #3 (text/plain)]
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic