
#19 0x7ff4a631efad in dissector_try_uint_new wireshark/epan/packet.c:1148:9 #18 0x7ff4a631f7da in call_dissector_work wireshark/epan/packet.c:691:9 #17 0x7ff4a632ceb1 in call_dissector_through_handle wireshark/epan/packet.c:616:8

#16 0x7ff4a743ace9 in dissect_ip wireshark/epan/dissectors/packet-ip.c:2508:5 #14 0x7ff4a743a59b in ip_try_dissect wireshark/epan/dissectors/packet-ip.c:2001:7 #13 0x7ff4a631efad in dissector_try_uint_new wireshark/epan/packet.c:1148:9 #12 0x7ff4a631f7da in call_dissector_work wireshark/epan/packet.c:691:9 #11 0x7ff4a632ceb1 in call_dissector_through_handle wireshark/epan/packet.c:616:8 #10 0x7ff4a82f7f53 in dissect_tcp wireshark/epan/dissectors/packet-tcp.c:5575:13

#9 0x7ff4a82e2b4c in dissect_tcp_payload wireshark/epan/dissectors/packet-tcp.c:4743:9 #8 0x7ff4a82e77f3 in process_tcp_payload wireshark/epan/dissectors/packet-tcp.c:4668:13 #7 0x7ff4a82e1f80 in decode_tcp_ports wireshark/epan/dissectors/packet-tcp.c:4610:9 #6 0x7ff4a631efad in dissector_try_uint_new wireshark/epan/packet.c:1148:9 #5 0x7ff4a631f7da in call_dissector_work wireshark/epan/packet.c:691:9 #4 0x7ff4a632ceb1 in call_dissector_through_handle wireshark/epan/packet.c:616:8 #3 0x7ff4a8324de2 in dissect_tds_message wireshark/epan/dissectors/packet-tds.c:4090:13 #2 0x7ff4a8326608 in dissect_netlib_buffer wireshark/epan/dissectors/packet-tds.c:3911:17 #1 0x7ff4a8328d41 in dissect_tds_resp wireshark/epan/dissectors/packet-tds.c:3729:32

#0 0x7ff4a833d06c in dissect_tds7_colmetadata_token wireshark/epan/dissectors/packet-tds.c:2935:29 WRITE of size 8 at 0x7ffd11f12408 thread T0 The following crash due to a stack-based buffer overflow can be observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark ("$.
