Cisco Bug: CSCvs56304 - RADIUS Authentication packets cause Segmentation Fault in Ethanalyzer when capturing on mgmt int
Jun 10, 2020
- Cisco Firepower 9300 Series
Known Affected Releases
Symptom: # ethanalyzer local interface mgmt capture-filter 'host 10.122.149.95' Capturing on 'eth0' /tmp/abc-script.VLL65g: line 2: 27992 Segmentation fault (core dumped) /isan/bin/tshark -t ad -l -i eth0 -o tcp.check_checksum:false -f 'host 10.122.149.95' -w /tmp/etherfilter -P -c 10 Program exited with status 0. Conditions: RADIUS & TACACS Authentication configured on FCM.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases