Wireshark-announce: [Wireshark-announce] Wireshark 2.2.7 is now available
Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Thu, 1 Jun 2017 13:44:39 -0700
I'm proud to announce the release of Wireshark 2.2.7.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2017-22
       Bazaar dissector infinite loop ([2]Bug 13599) [3]CVE-2017-9352
     * [4]wnpa-sec-2017-23
       DOF dissector read overflow ([5]Bug 13608) [6]CVE-2017-9348
     * [7]wnpa-sec-2017-24
       DHCP dissector read overflow ([8]Bug 13609, [9]Bug 13628)
       [10]CVE-2017-9351
     * [11]wnpa-sec-2017-25
       SoulSeek dissector infinite loop ([12]Bug 13631) [13]CVE-2017-9346
     * [14]wnpa-sec-2017-26
       DNS dissector infinite loop ([15]Bug 13633) [16]CVE-2017-9345
     * [17]wnpa-sec-2017-27
       DICOM dissector infinite loop ([18]Bug 13685) [19]CVE-2017-9349
     * [20]wnpa-sec-2017-28
       openSAFETY dissector memory exhaustion ([21]Bug 13649)
       [22]CVE-2017-9350
     * [23]wnpa-sec-2017-29
       BT L2CAP dissector divide by zero ([24]Bug 13701) [25]CVE-2017-9344

     * [26]wnpa-sec-2017-30
       MSNIP dissector crash ([27]Bug 13725) [28]CVE-2017-9343

     * [29]wnpa-sec-2017-31
       ROS dissector crash ([30]Bug 13637) [31]CVE-2017-9347

     * [32]wnpa-sec-2017-32
       RGMP dissector crash ([33]Bug 13646) [34]CVE-2017-9354

     * [35]wnpa-sec-2017-33
       IPv6 dissector crash ([36]Bug 13675) [37]CVE-2017-9353

   The following bugs have been fixed:
     * DICOM dissection error. ([38]Bug 13164)
     * Qt: drag & drop of one column header in PacketList moves other
       columns. ([39]Bug 13183)
     * Can not export captured DICOM objects in version 2.2.5. ([40]Bug
       13570)
     * False complain about bad checksum of ICMP extension header.
       ([41]Bug 13586)

     * LibFuzzer: ISUP dissector bug (isup.number_different_meaning).
       ([42]Bug 13588)
     * Dissector Bug, protocol BT ATT. ([43]Bug 13590)
     * Wireshark dispalys
       RRCConnectionReestablishmentRejectRRCConnectionReestablishmentRejec
       t in Info column. ([44]Bug 13595)

     * [oss-fuzz] UBSAN: shift exponent 105 is too large for 32-bit type
       int in packet-ositp.c:551:79. ([45]Bug 13606)

     * [oss-fuzz] UBSAN: shift exponent -77 is negative in
       packet-netflow.c:7717:23. ([46]Bug 13607)

     * [oss-fuzz] UBSAN: shift exponent 1959 is too large for 32-bit type
       int in packet-sigcomp.c:2128:28. ([47]Bug 13610)

     * [oss-fuzz] UBSAN: shift exponent 63 is too large for 32-bit type
       guint32 (aka unsigned int) in packet-rtcp.c:917:24. ([48]Bug 13611)

     * [oss-fuzz] UBSAN: shift exponent 70 is too large for 64-bit type
       guint64 (aka unsigned long) in dwarf.c:42:43. ([49]Bug 13616)

     * [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type
       int in packet-xot.c:260:23. ([50]Bug 13618)

     * [oss-fuzz] UBSAN: shift exponent -5 is negative in
       packet-sigcomp.c:1722:36. ([51]Bug 13619)

     * [oss-fuzz] UBSAN: index 2049 out of bounds for type char [2049] in
       packet-quakeworld.c:134:5. ([52]Bug 13624)

     * [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type
       int in packet-netsync.c:467:25. ([53]Bug 13639)

     * [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type
       int in packet-sigcomp.c:3857:24. ([54]Bug 13641)

     * [oss-fuzz] ASAN: stack-use-after-return
       epan/dissectors/packet-ieee80211.c:14341:23 in add_tagged_field.
       ([55]Bug 13662)
     * Welcome screen invalid capture filter wihtout WinPcap installed
       causes runtime error. ([56]Bug 13672)
     * SMB protocol parser does not parse SMB_COM_TRANSACTION2_SECONDARY
       (0x33) command correctly. ([57]Bug 13690)
     * SIP packets with SDP marked as malformed. ([58]Bug 13698)

     * [oss-fuzz] UBSAN: index 8 out of bounds for type gboolean const[8]
       in packet-ieee80211-radiotap.c:1836:12. ([59]Bug 13713)
     * Crash on "Show packet bytes..." context menu item click. ([60]Bug
       13723)
     * DNP3 dissector does not properly decode packed variations with
       prefixed qualifiers. ([61]Bug 13733)

  New and Updated Features

   There are no new features in this release.

  New File Format Decoding Support

   There are no new file formats in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   Bazaar, BT ATT, BT L2CAP, DHCP, DICOM, DNP3, DNS, DOF, DWARF, ICMP,
   IEEE 802.11, IPv6, ISUP, LTE RRC, MSNIP, Netflow, Netsync, openSAFETY,
   OSITP, QUAKEWORLD, Radiotap, RGMP, ROS, RTCP, SIGCOMP, SMB, SoulSeek,
   and XOT

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.

  Major API Changes

   There are no major API changes in this release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [62]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [63]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([64]Bug 1419)

   The BER dissector might infinitely loop. ([65]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([66]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([67]Bug 2234)

   Application crash when changing real-time option. ([68]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([69]Bug 4985)

   Wireshark should let you work with multiple capture files. ([70]Bug
   10488)

   Dell Backup and Recovery (DBAR) makes many Windows applications crash,
   including Wireshark. ([71]Bug 12036)
     __________________________________________________________________

Getting Help

   Community support is available on [72]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [73]the web site.

   Official Wireshark training and certification are available from
   [74]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [75]Wireshark web site.
     __________________________________________________________________

   Last updated 2017-06-01 18:22:54 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2017-22.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9352
   4. https://www.wireshark.org/security/wnpa-sec-2017-23.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9348
   7. https://www.wireshark.org/security/wnpa-sec-2017-24.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
  10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9351
  11. https://www.wireshark.org/security/wnpa-sec-2017-25.html
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
  13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9346
  14. https://www.wireshark.org/security/wnpa-sec-2017-26.html
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
  16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9345
  17. https://www.wireshark.org/security/wnpa-sec-2017-27.html
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
  19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9349
  20. https://www.wireshark.org/security/wnpa-sec-2017-28.html
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
  22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350
  23. https://www.wireshark.org/security/wnpa-sec-2017-29.html
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
  25. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9344
  26. https://www.wireshark.org/security/wnpa-sec-2017-30.html
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
  28. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9343
  29. https://www.wireshark.org/security/wnpa-sec-2017-31.html
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
  31. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9347
  32. https://www.wireshark.org/security/wnpa-sec-2017-32.html
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
  34. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9354
  35. https://www.wireshark.org/security/wnpa-sec-2017-33.html
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
  37. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9353
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13164
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13183
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13570
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13586
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13588
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13590
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13595
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13606
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13607
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13610
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13611
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13616
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13618
  51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13619
  52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624
  53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13639
  54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13641
  55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13662
  56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13672
  57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13690
  58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13698
  59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13713
  60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13723
  61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13733
  62. https://www.wireshark.org/download.html
  63. https://www.wireshark.org/download.html#thirdparty
  64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  66. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  67. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  68. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  69. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  70. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  71. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  72. https://ask.wireshark.org/
  73. https://www.wireshark.org/lists/
  74. http://www.wiresharktraining.com/
  75. https://www.wireshark.org/faq.html


Digests

wireshark-2.2.7.tar.bz2: 32309420 bytes
SHA256(wireshark-2.2.7.tar.bz2)=689ddf62221b152779d8846ab5b2063cc7fd41ec1a9f04eefab09b5d5486dbb5
RIPEMD160(wireshark-2.2.7.tar.bz2)=baf598f495c04f3709cb02c9046b8176f5f5c72e
SHA1(wireshark-2.2.7.tar.bz2)=2bb1cdf56a93fb22a66e8179214b587c71f06c9e
MD5(wireshark-2.2.7.tar.bz2)=a4d880554c7f925dafef60fa313b580d

Wireshark-win64-2.2.7.exe: 49400720 bytes
SHA256(Wireshark-win64-2.2.7.exe)=cc8e6feff1e72d1baaafb277e33c9137a76a5edeca629fe4c764070a0719df50
RIPEMD160(Wireshark-win64-2.2.7.exe)=e1b5395752ff672593bb02e02c9d43b969a6d136
SHA1(Wireshark-win64-2.2.7.exe)=bb9f0c2f8448069e8ef33302e3e8a5182a066788
MD5(Wireshark-win64-2.2.7.exe)=30570a7b54c17da897cf155e35a2f44a

Wireshark-win32-2.2.7.exe: 44550128 bytes
SHA256(Wireshark-win32-2.2.7.exe)=6f5ef2ed9aed62f3613f66b960f50663cfb4ec4b59c9fe1fa11ff08137c8a0c0
RIPEMD160(Wireshark-win32-2.2.7.exe)=14aa5ae001272ac7ce1eea2d166f02b89a1de76c
SHA1(Wireshark-win32-2.2.7.exe)=1c778e2885fbf0668f75567841d0b00c73b9c7d6
MD5(Wireshark-win32-2.2.7.exe)=ab254d59f70aec9178aeb8a76a24de50

WiresharkPortable_2.2.7.paf.exe: 46147736 bytes
SHA256(WiresharkPortable_2.2.7.paf.exe)=3fc82830a4d2b0d620ef37c1fd406d99e5cad7ff2c831b1d284f5e87282ae2c1
RIPEMD160(WiresharkPortable_2.2.7.paf.exe)=2d699d1fe6d1bd2e30000cff21837d17d069725f
SHA1(WiresharkPortable_2.2.7.paf.exe)=5cc73524dfc49780ce22f8dfe4d74876c2f9eb5a
MD5(WiresharkPortable_2.2.7.paf.exe)=d05d04a6ce82a7253949d45cc5fb6186

Wireshark 2.2.7 Intel 64.dmg: 32873230 bytes
SHA256(Wireshark 2.2.7 Intel
64.dmg)=6d46e7270fc6b661ece24c0fcaf56c7e4ce4f65501ef055ea46c6cfdf95c6dcb
RIPEMD160(Wireshark 2.2.7 Intel
64.dmg)=7b1ab739f9dc24c03b9b825a8533e0e891ee822f
SHA1(Wireshark 2.2.7 Intel 64.dmg)=50fa591d6fb0d4f59a5c2c9c12c1f114522f8377
MD5(Wireshark 2.2.7 Intel 64.dmg)=2814af6a4f0c851e1d44213d96428919

Attachment: signature.asc
Description: OpenPGP digital signature