https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15226
Bug ID: 15226
Summary: OPC UA Max nesting depth exceeded for valid packet
Product: Wireshark
Version: 2.6.4
Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
Severity: Major
Priority: Low
Component: Dissection engine (libwireshark)
Assignee: bugzilla-ad...@wireshark.org
Reporter: eng...@gmail.com
Target Milestone: ---
Created attachment 16665
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16665&action=edit
SampleFile
Build Information:
Version 2.6.4 (v2.6.4-0-g29d48ec8)
Copyright 1998-2018 Gerald Combs <ger...@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 5.9.5, with WinPcap (4_1_3), with GLib 2.42.0, with
zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS
3.4.11, with Gcrypt 1.7.6, with MIT Kerberos, with MaxMind DB resolver, with
nghttp2 1.14.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia,
with AirPcap, with SBC, with SpanDSP, with bcg729.
Running on 64-bit Windows 10, build 17134, with Intel(R) Core(TM) i7-4790 CPU @
3.60GHz (with SSE4.2), with 16335 MB of physical memory, with locale
Czech_Czechia.1250, with WinPcap version 4.1.3 (packet.dll version 4.1.0.2980),
based on libpcap version 1.0 branch 1_0_rel0b (20091008), with GnuTLS 3.4.11,
with Gcrypt 1.7.6, without AirPcap, binary plugins supported (15 loaded). Built
using Microsoft Visual C++ 14.12 build 25835
--
OPC UA Max nesting depth exceeded for valid packet.
Since this commit https://code.wireshark.org/review/#/c/29645/
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe