Wireshark-dev: [Wireshark-dev] Wireshark 1.4.12 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 27 Mar 2012 13:09:03 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.4.12. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. o wnpa-sec-2012-04 The ANSI A dissector could dereference a NULL pointer and crash. (Bug 6823) Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5. o wnpa-sec-2012-06 The pcap and pcap-ng file parsers could crash trying to read ERF data. (Bug 6804) Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5. o wnpa-sec-2012-07 The MP2T dissector could try to allocate too much memory and crash. (Bug 6804) Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5. o The Windows installers now include GnuTLS 1.12.18, which fixes several vulnerabilities. The following bugs have been fixed: o Some PGM options are not parsed correctly. (Bug 5687) o dumpcap crashes when capturing from pipe to a pcap-ng file (e.g., when passing data from CACE Pilot to Wireshark). (Bug 5939) o No error for UDP/IPv6 packet with zero checksum. (Bug 6232) o packetBB dissector bug: More than 1000000 items in the tree -- possible infinite loop. (Bug 6687) o Ethernet traces in K12 text format sometimes give bogus "malformed frame" errors and other problems. (Bug 6735) o non-IPP packets to or from port 631 are dissected as IPP. (Bug 6765) o IAX2 dissector reads past end of packet for unknown IEs. (Bug 6815) o Pcap-NG files with SHB options longer than 100 bytes aren't recognized as pcap-NG files, and options longer than 100 bytes in other blocks aren't handled either. (Bug 6846) o Patch to fix DTLS decryption. (Bug 6847) o Expression... dialog is crash. (Bug 6891) o ISAKMP : VendorID CheckPoint : Malformed Packet. (Bug 6972) o Radiotap dissector lists a bogus "DBM TX Attenuation" bit. (Bug 7000) o MySQL dissector assertion. (Ask 8649) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support HTTP, ISAKMP, MySQL, PacketBB, PGM, TCP, UDP New and Updated Capture File Support Endace ERF, Pcap-NG. Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with the same libraries as the 32-bit installer. (Bug 3610) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Training is available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.4.12.tar.bz2: 20651287 bytes MD5(wireshark-1.4.12.tar.bz2)=92b625d3579b7cf1b05b3a022683562a SHA1(wireshark-1.4.12.tar.bz2)=b7f4a07f9ebaeb355dbd962cd10ad942852c341b RIPEMD160(wireshark-1.4.12.tar.bz2)=063cf7e30fcb44400401784c5f36be157aec6926 wireshark-win64-1.4.12.exe: 21853983 bytes MD5(wireshark-win64-1.4.12.exe)=06ab1726ccfe30519138282f37c668fe SHA1(wireshark-win64-1.4.12.exe)=c602466b9bca36578c2ac5b996ec08628d1ed37c RIPEMD160(wireshark-win64-1.4.12.exe)=5a88d2fff85c79539a460ddb97afa74d1a1a82db wireshark-win32-1.4.12.exe: 19838439 bytes MD5(wireshark-win32-1.4.12.exe)=156bb58d17574530eb5f56aad98d995f SHA1(wireshark-win32-1.4.12.exe)=f935f0ffa215f7c842f970d39d3c0ee5819030fa RIPEMD160(wireshark-win32-1.4.12.exe)=606e9c0aa6054a354e4f713b8a7217b6728ae6c4 wireshark-1.4.12.u3p: 26371670 bytes MD5(wireshark-1.4.12.u3p)=00129d6a56f76be2a72001fc6d028534 SHA1(wireshark-1.4.12.u3p)=1c3c3d17a0a249021e8dfa6afb6c8dbdc48cfb80 RIPEMD160(wireshark-1.4.12.u3p)=305c06ef47505bf1c9b431e9ff883fce6d0b0d6d WiresharkPortable-1.4.12.paf.exe: 20567072 bytes MD5(WiresharkPortable-1.4.12.paf.exe)=1de850306fa120bd4496932e9b1d77d6 SHA1(WiresharkPortable-1.4.12.paf.exe)=d7593ea31548b17cea1a401b1d83f52bbdbbf27f RIPEMD160(WiresharkPortable-1.4.12.paf.exe)=1438d05b3a5d3cf0135048ced4cf0769956a2db2 Wireshark 1.4.12 Intel 32.dmg: 47890478 bytes MD5(Wireshark 1.4.12 Intel 32.dmg)=51f7973e39244afdb47d824bd602c84f SHA1(Wireshark 1.4.12 Intel 32.dmg)=f51c33cd32006dc86b59b1c25345664f6df3741d RIPEMD160(Wireshark 1.4.12 Intel 32.dmg)=cb3f233408455cc1743e8cfda7126ce136af952f Wireshark 1.4.12 PPC 32.dmg: 50419351 bytes MD5(Wireshark 1.4.12 PPC 32.dmg)=eec668afbc150030cd4b540e1a04a9be SHA1(Wireshark 1.4.12 PPC 32.dmg)=dc25b5050a61b5370c86117500db2bc8ace061c9 RIPEMD160(Wireshark 1.4.12 PPC 32.dmg)=0b44bbe78793abac2b77a09fdcc1d3c99dd24f69 Wireshark 1.4.12 Intel 64.dmg: 45566064 bytes MD5(Wireshark 1.4.12 Intel 64.dmg)=1b3ea04af54339b0aad7c008cc68aae7 SHA1(Wireshark 1.4.12 Intel 64.dmg)=7b53b8ca9bdb17290e94b71074fa4e8a0a596690 RIPEMD160(Wireshark 1.4.12 Intel 64.dmg)=123dcb72a953021fbae24e0d4ea9ebf2beb9a592 patch-wireshark-1.4.11-to-1.4.12.diff.bz2: 106523 bytes MD5(patch-wireshark-1.4.11-to-1.4.12.diff.bz2)=f9a5081e560f919065f18c27e5b11c47 SHA1(patch-wireshark-1.4.11-to-1.4.12.diff.bz2)=192b2283bedf4ad0168f8cc274ab8e730d3e8f5f RIPEMD160(patch-wireshark-1.4.11-to-1.4.12.diff.bz2)=b430f88a3d21c8b74e9dbd02c695826021ea03a0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk9yHl8ACgkQpw8IXSHylJqEnQCdFeAl/B1jqll1u9dUwSQds7MX qlYAn1c9z6J+nOtqrKB0f7Czpg4X9wCG =e47Z -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-dev] Wireshark 1.6.6 is now available
- Next by Date: [Wireshark-dev] compile error in airpcap_dlg.c:‘GTK_CAN_DEFAULT’ undeclared
- Previous by thread: [Wireshark-dev] Wireshark 1.6.6 is now available
- Next by thread: [Wireshark-dev] compile error in airpcap_dlg.c:‘GTK_CAN_DEFAULT’ undeclared
- Index(es):