https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6120
Bill Meier <wmeier@xxxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |FIXED
--- Comment #2 from Bill Meier <wmeier@xxxxxxxxxxx> 2011-07-14 16:09:58 EDT ---
The cause of the crash was fixed in SVN #38023.
The crash was caused by improper handling in RTP ! Stream Analysis of the case
where the capture frames were truncated.
Thanks for the report.
I'll queue this fix for the next Wireshark 1.4.8 and 1.6.1 releases.
(See http://wiki.wireshark.org/Development/Roadmap).
If you wish to try the fix before the next Wireshark 1.6 release you'll shortly
be able to download a Windows development version of Wireshark with the fix
from:
http://www.wireshark.org/download/automated/win32/
You'll want a file named wireshark-win32-1.7.0-SVN-38023.exe or newer.
P.S.: I haven't dug into the code, but I wouldn't be all that surprised if it
turned out that some of the numbers from the RTP Analysis are incorrect when
analyzing capture files with truncated RTP frames.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.