From 6ba54030d248c2d7d0436e6544784f2591d9986f Mon Sep 17 00:00:00 2001 From: Pascal Quantin Date: Sun, 18 Oct 2015 10:58:37 +0200 Subject: UMTS FP: fix another out of bounds access According to NBAP ASN.1, the maximum DCH ID value is 255 Bug: 11606 Change-Id: Ic5c85a31eb1a84d59f25baaed4afbd040a7852c5 Reviewed-on: https://code.wireshark.org/review/11126 Petri-Dish: Pascal Quantin Tested-by: Petri Dish Buildbot Reviewed-by: Pascal Quantin (cherry picked from commit 67b6d4f7e6f2117b40957fd51518aa2a3e659002) Reviewed-on: https://code.wireshark.org/review/11128 --- epan/dissectors/packet-umts_fp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/epan/dissectors/packet-umts_fp.c b/epan/dissectors/packet-umts_fp.c index 51b8fbeb4d..7d21b838f9 100644 --- a/epan/dissectors/packet-umts_fp.c +++ b/epan/dissectors/packet-umts_fp.c @@ -3812,7 +3812,7 @@ heur_dissect_fp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data return TRUE; } static guint8 fakes =5; /*[] ={1,5,8};*/ -static guint8 fake_map[31]; +static guint8 fake_map[256]; /* * TODO: This need to be fixed! -- cgit v1.2.1