Wireshark-bugs: [Wireshark-bugs] [Bug 4942] New: Decoding NetFlow option data record incorrectly
Date: Mon, 28 Jun 2010 05:29:58 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4942

           Summary: Decoding NetFlow option data record incorrectly
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: irino@xxxxxxxxxxxxxx


Created an attachment (id=4853)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4853)
patch for decoding NetFlow option data record

Build Information:
wireshark 1.5.0 (SVN Rev 33347 from /trunk)

Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.20.1, (64-bit) with GLib 2.24.1, with libpcap 1.0.0, with
libz 1.2.3.3, without POSIX capabilities, without libpcre, without SMI, without
c-ares, without ADNS, without Lua, without Python, without GnuTLS, without
Gcrypt, without Kerberos, without GeoIP, without PortAudio, without AirPcap.

Running on Linux 2.6.32-22-generic, with libpcap version 1.0.0, with libz
1.2.3.3.

Built using gcc 4.4.3.
--
This patch
1. fix the bug in dissect_v9_pdu.
(The bug is introduced in r32627, It's my fault, I'm sorry.)
When option data record is decoded, unpatched dissect_v9_pdu decode only scope
fields, it does not decode following data fields. And it runs in endless loop
when length of a scope filed is 0. This patch solve these problem.
2. defines some value_strings for some fields.
3. updates URLs in comment.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.