Wireshark-announce: [Wireshark-announce] Wireshark 1.8.10 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 10 Sep 2013 12:52:42 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.8.10. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. o wnpa-sec-2013-55 The NBAP dissector could crash. Discovered by Laurent Butti. (Bug 9005) Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9. o wnpa-sec-2013-56 The ASSA R3 dissector could go into an infinite loop. Discovered by Ben Schmidt. (Bug 9020 ) Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9. o wnpa-sec-2013-57 The RTPS dissector could overflow a buffer. Discovered by Ben Schmidt. (Bug 9019 ) Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9. o wnpa-sec-2013-58 The MQ dissector could crash. (Bug 9079 ) Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9. o wnpa-sec-2013-59 The LDAP dissector could crash. Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9. o wnpa-sec-2013-60 The Netmon file parser could crash. Discovered by G. Geshev. (Bug 8742 ) Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9. The following bugs have been fixed: o Lua ByteArray:append() causes wireshark crash. (Bug 4461) o Lua script can not get "data-text-lines" protocol data. (Bug 5200) o PER normally small non-negative whole number decoding is wrong when >= 64. (Bug 8841) o Incorrect parsing of IPFIX *IpTotalLength elements. (Bug 8918) o IO graph/advanced, max/min/summ error on frames with multiple Diameter messages. (Bug 8980) o Wireshark fails to decode single-line, multiple Contact: URIs in SIP responses. (Bug 9031) o Dissector for EtherCAT: ADS highlighting in the Packet Bytes Pane is incorrect. (Bug 9036) o 802.11 HT Extended Capabilities B10 decode incorrect. (Bug 9038) o Weird malformed HTTP error. (Bug 9101) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ASSA R3, EtherCAT AMS, GTPv2, HTTP, IEEE 802.11, IPFIX, LDAP, MQ, NBAP, NCP SSS, RTPS, SIP, New and Updated Capture File Support Microsoft Network Monitor. Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. (Win64 development page) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Official Wireshark training and certification are available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.8.10.tar.bz2: 24125925 bytes MD5(wireshark-1.8.10.tar.bz2)=c7170253e57baa4552a9d8470330ca42 SHA1(wireshark-1.8.10.tar.bz2)=ebb41dde83532205e989eb5a7b03a21250d865b9 RIPEMD160(wireshark-1.8.10.tar.bz2)=1477510a40e0dbb21403432807779635419f83a9 Wireshark-win32-1.8.10.exe: 20747096 bytes MD5(Wireshark-win32-1.8.10.exe)=db6ef0679f58f7ee0ea6a0defc2a73c7 SHA1(Wireshark-win32-1.8.10.exe)=48f6d4dc6873c9bec466006171305fa99f690bbe RIPEMD160(Wireshark-win32-1.8.10.exe)=739eb2d7a45c37763a4d9a6dc25da15cf404a2dd Wireshark-win64-1.8.10.exe: 26405880 bytes MD5(Wireshark-win64-1.8.10.exe)=eae6fcbac37b177920a47cd189fb143e SHA1(Wireshark-win64-1.8.10.exe)=1e6e346fb1da336cefbe197d86bc3a1dcd3fb915 RIPEMD160(Wireshark-win64-1.8.10.exe)=bc874ab12ef4af041e47e983e0a6be2850b451f3 Wireshark-1.8.10.u3p: 28434785 bytes MD5(Wireshark-1.8.10.u3p)=82677cf75230550ce338c46accabc497 SHA1(Wireshark-1.8.10.u3p)=fc9583da48017f337d40f73015b785514aa51e67 RIPEMD160(Wireshark-1.8.10.u3p)=4f39e88d17678d55546276d14c9df863ed425e52 WiresharkPortable-1.8.10.paf.exe: 21926424 bytes MD5(WiresharkPortable-1.8.10.paf.exe)=00bc683dd5946597d6bf59beca4290fc SHA1(WiresharkPortable-1.8.10.paf.exe)=a49eb67a9d778f93a1ef17bdf8b88be783f306c3 RIPEMD160(WiresharkPortable-1.8.10.paf.exe)=90f3971262a03648aadc43bc8d2f48e61731999d Wireshark 1.8.10 Intel 64.dmg: 21799103 bytes MD5(Wireshark 1.8.10 Intel 64.dmg)=2d586a9ffb87d10710ffb56e45bfcbe1 SHA1(Wireshark 1.8.10 Intel 64.dmg)=bce51fa2bc62c19577b69d581e7d659ce0f7cf3e RIPEMD160(Wireshark 1.8.10 Intel 64.dmg)=ca516c212b4f596baa14a5b1217437148891df6c Wireshark 1.8.10 Intel 32.dmg: 18289613 bytes MD5(Wireshark 1.8.10 Intel 32.dmg)=b447f1d4e7854b8002b9ba0ba1a43d4e SHA1(Wireshark 1.8.10 Intel 32.dmg)=b042adfdc39a3ee2a1439108a10158edd3597181 RIPEMD160(Wireshark 1.8.10 Intel 32.dmg)=952da8a6c485241f0aab074294a7da7ed160b6ab Wireshark 1.8.10 PPC 32.dmg: 22758732 bytes MD5(Wireshark 1.8.10 PPC 32.dmg)=62515a1dead28a11bc53ee37b35c5e03 SHA1(Wireshark 1.8.10 PPC 32.dmg)=a39180de81acb56dfb0203d46c485a02ef1b54f7 RIPEMD160(Wireshark 1.8.10 PPC 32.dmg)=7c0a358931ebee94e144c1765532403a8aba30c9 patch-wireshark-1.8.9-to-1.8.10.diff.bz2: 631515 bytes MD5(patch-wireshark-1.8.9-to-1.8.10.diff.bz2)=1318198e48da7b9f9a815c5d1568d5e0 SHA1(patch-wireshark-1.8.9-to-1.8.10.diff.bz2)=51a27837937cd9fc74f2359faded69e70f2e5ad5 RIPEMD160(patch-wireshark-1.8.9-to-1.8.10.diff.bz2)=d6c3250aad2d097b70d2b159c0a19bf2190142b5 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (Darwin) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlIveIoACgkQpw8IXSHylJpqugCgqmUHe5yMmLeNSHjcaGbdOqaf T/8An0bkjPOC0fzsft0MIEXWLsPJI/f3 =aewZ -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-announce] Wireshark 1.10.2 is now available
- Previous by thread: [Wireshark-announce] Wireshark 1.10.2 is now available
- Index(es):