https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12951

--- Comment #5 from Jaap Keuter <jaap.keu...@xs4all.nl> ---
The errored packet is related to line 2533 in your change of packet-icmpv6.c. 

The (incorrect) length value '1' causes the metric_len variable to underflow,
rolling over to 255. Then it continues to dissect the data as DAG Metric
Container ad infinitum. Or more precisely, until that TVB runs out of data.

This should not happen, as in, your dissector should withstand protocol errors
in the packet it receives (which are the circumstances Wireshark gets called in
to help) as well as possible. Changing this to gint should work fine.

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to