Wireshark-bugs: [Wireshark-bugs] [Bug 10863] New: Malformed Packet on rsync-version with length
Date: Fri, 16 Jan 2015 23:35:07 +0000
Bug ID 10863
Summary Malformed Packet on rsync-version with length 2
Product Wireshark
Version 1.12.3
Hardware x86-64
OS Linux (other)
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter bugs.wireshark@dokumenteundeinstellungen.de

Created attachment 13397 [details]
malformed sample

Build Information:
Version 1.12.3 (Git Rev Unknown from unknown)

Copyright 1998-2015 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 3.14.7, with Cairo 1.14.0, with Pango 1.36.8, with
GLib 2.42.1, with libpcap, with libz 1.2.8, with POSIX capabilities (Linux),
with libnl 3, without SMI, without c-ares, without ADNS, with Lua 5.2, without
Python, with GnuTLS 3.3.11, with Gcrypt 1.6.2, with MIT Kerberos, without
GeoIP,
with PortAudio V19-devel (built Jan 31 2014 21:19:35), without AirPcap.

Running on Linux 3.17.6-1-ARCH, with locale de_DE.UTF-8, with libpcap version
1.6.2, with libz 1.2.8, GnuTLS 3.3.11, Gcrypt 1.6.2.
Intel(R) Core(TM) i3 CPU       M 370  @ 2.40GHz

Built using gcc 4.9.2 20141224 (prerelease).
--
It seems that the dissector for rsync can't handle rsync-versions reported with
length 2.

I guess the "malformed packet"-error has something to do with the hardcoded
length of 4 on line 121 in packet-rsync.c.

Attached a sample with the answer of "29" received from a server.


You are receiving this mail because:
  • You are watching all bug changes.