(/home/sate/Testcases/c/cve/wireshark-1.2.0/epan/dissectors/packet-inap.c) |
| |
| 1401 | | | dissect_inap_T_local(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { |
| 1402 | | | #line 165 "inap.cnf" |
| 1403 | | | offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index, |
| 1404 | | | &opcode); |
| 1405 | | | |
| 1406 | | | if (inap_opcode_type == INAP_OPCODE_RETURN_ERROR){ |
Event 1:
Taking true branch. inap_opcode_type == 3 evaluates to true.
hide
|
|
| 1407 | | | errorCode = opcode; |
| 1408 | [+] | | if (check_col(actx->pinfo->cinfo, COL_INFO)){ |
 |
| 1409 | | | col_append_str(actx->pinfo->cinfo, COL_INFO, |
| 1410 | [+] | | val_to_str(errorCode, inap_err_code_string_vals, "Unknown INAP error (%u)")); |
Event 6:
inap_err_code_string_vals is passed to val_to_str() as the second argument. - This points to the buffer that will be overrun later.
hide
|
|
 |
| |