The packet-nbns.c dissector picks random data as the NBSS PDU length in certain situations
This issue was migrated from bug 4914 in our old bug tracker.
Original bug information:
Reporter: Frank Schorr
Status: RESOLVED FIXED
Product: Wireshark
Component: GTK+ UI
OS: Windows XP
Platform: All
Version: 1.4.0
Attachments:
nbss-bug-one_direction.cap: capture showing the problem
packet-nbns.patch: Proposed patch to handle the bug
nbss-length-01.patches.txt: Patch that fixes false positives and allows large smb1/2 pdus
nbss-length-02.patches.txt: Better patch for SMB2 multi-credit/large mtu support