]> The Tcpdump Group git mirrors - tcpdump/blob - tests/tok2str-oobr-2.out
tested this CVE with 32-bit on 4.9.3, and it seems to be fixed
[tcpdump] / tests / tok2str-oobr-2.out
1 01:01:01:01:01:01 > 02:02:02:02:02:02, ethertype MPLS unicast (0x8847), length 130: MPLS (label 16006, exp 0, [S], ttl 255)
2 (tos 0x0, ttl 1, id 32770, offset 0, flags [DF, rsvd], proto UDP (17), length 112, options (RA), bad cksum a4cc (->a4cb)!)
3 192.168.0.1.3503 > 127.0.0.1.3503: [bad udp cksum 0x8397 -> 0x3f6d!]
4 LSP-PINGv1, msg-type: MPLS Echo Request (1), length: 80
5 reply-mode: Reply via an IPv4/IPv6 UDP packet (2)
6 Return Code: unknown (65)
7 Return Subcode: (0)
8 Sender Handle: 0x00000023, Sequence: 1
9 Sender Timestamp: Receiver Timestamp: no timestamp
10 Target FEC Stack TLV (1), length: 24
11 Unknown subTLV (17), length: 20
12 0x0000: 0000 0001 0000 0001 c0a8 0001 c0a8 0001
13 0x0010: 0000 2712
14 0x0000: 0011 0014 0000 0001 0000 0001 c0a8 0001
15 0x0010: c0a8 0001 0000 2712
16 Unknown TLV (268), length: 4
17 0x0000: 0008 00c8
18 Unknown TLV (523), length: 8
19 0x0000: 0003 0004 c0a8 0104