https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15226

            Bug ID: 15226
           Summary: OPC UA Max nesting depth exceeded for valid packet
           Product: Wireshark
           Version: 2.6.4
          Hardware: x86
                OS: Windows 10
            Status: UNCONFIRMED
          Severity: Major
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: eng...@gmail.com
  Target Milestone: ---

Created attachment 16665
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16665&action=edit
SampleFile

Build Information:
Version 2.6.4 (v2.6.4-0-g29d48ec8) 
Copyright 1998-2018 Gerald Combs <ger...@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
Compiled (64-bit) with Qt 5.9.5, with WinPcap (4_1_3), with GLib 2.42.0, with
zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS
3.4.11, with Gcrypt 1.7.6, with MIT Kerberos, with MaxMind DB resolver, with
nghttp2 1.14.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia,
with AirPcap, with SBC, with SpanDSP, with bcg729. 
Running on 64-bit Windows 10, build 17134, with Intel(R) Core(TM) i7-4790 CPU @
3.60GHz (with SSE4.2), with 16335 MB of physical memory, with locale
Czech_Czechia.1250, with WinPcap version 4.1.3 (packet.dll version 4.1.0.2980),
based on libpcap version 1.0 branch 1_0_rel0b (20091008), with GnuTLS 3.4.11,
with Gcrypt 1.7.6, without AirPcap, binary plugins supported (15 loaded). Built
using Microsoft Visual C++ 14.12 build 25835
--
OPC UA Max nesting depth exceeded for valid packet.

Since this commit https://code.wireshark.org/review/#/c/29645/

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to