Wireshark-dev: [Wireshark-dev] Wireshark 1.4.13 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 22 May 2012 11:13:33 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.4.13.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.

     o wnpa-sec-2012-08

       Infinite and large loops in the ANSI MAP, BACapp, Bluetooth
       HCI, IEEE 802.3, LTP, and R3 dissectors have been fixed.
       Discovered by Laurent Butti. (Bugs 7118, 7119, 7121, 7122,
       7124, 7125)

       Versions affected: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7.

     o wnpa-sec-2012-09

       The DIAMETER dissector could try to allocate memory improperly
       and crash. (Bug 7138)

       Versions affected: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7.

     o wnpa-sec-2012-10

       Wireshark could crash on SPARC processors due to misaligned
       memory. Discovered by Klaus Heckelmann. (Bug 7221)

       Versions affected: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7.

   The following bugs have been fixed:

     o User-Password - PAP decoding passwords longer than 16 bytes.
       (Bug 6779)

     o Wireshark error message for failure to open an rpcap: URL for
       a remote device is malformed. (Bug 6922)

     o Wireshark doesn't calculate the right IPv4 destination using
       source routing options when bad options precede them. (Bug
       7043)

     o Wrong values in DNS CERT RR. (Bug 7130)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ANSI MAP, BACapp, Bluetooth HCI, DIAMETER, DNS, IPv4, RADIUS

  New and Updated Capture File Support

   5View, pcap-ng

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with the same libraries
   as the 32-bit installer. (Bug 3610)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.4.13.tar.bz2: 21171774 bytes
MD5(wireshark-1.4.13.tar.bz2)=460473bbb23a6498bbd574a6e2d27853
SHA1(wireshark-1.4.13.tar.bz2)=86411bb4e79e5e45f851a9c57f9bf69135c90ebb
RIPEMD160(wireshark-1.4.13.tar.bz2)=71631b4829e6ef9b49569deefc8eb03d0459286f

wireshark-win32-1.4.13.exe: 19849677 bytes
MD5(wireshark-win32-1.4.13.exe)=6673b5a2f98c7f228e0f1506bb3cd7c4
SHA1(wireshark-win32-1.4.13.exe)=c4be1ae62218267e6738df687088777818e928e3
RIPEMD160(wireshark-win32-1.4.13.exe)=892d5f232b7d3a44175ec799f5801632d2a20438

wireshark-win64-1.4.13.exe: 21877367 bytes
MD5(wireshark-win64-1.4.13.exe)=a40411fd1ccc98b4f4aa81fd135f37d6
SHA1(wireshark-win64-1.4.13.exe)=3ffa09457044069b7f64e33afd8e85cda26ad72b
RIPEMD160(wireshark-win64-1.4.13.exe)=1451a7d0c16c305ffd46aa876c6fa5937d717183

wireshark-1.4.13.u3p: 26397050 bytes
MD5(wireshark-1.4.13.u3p)=ca345e6daec47565ad618e2949b75563
SHA1(wireshark-1.4.13.u3p)=6c3010517c93c202963d7cb1a0fa7932f6bed2c9
RIPEMD160(wireshark-1.4.13.u3p)=fc7bbe46a6042439095e777e4f7351bb322b3377

WiresharkPortable-1.4.13.paf.exe: 20582347 bytes
MD5(WiresharkPortable-1.4.13.paf.exe)=afc6a65458c7a4eaadceed3d5a692de1
SHA1(WiresharkPortable-1.4.13.paf.exe)=0471e396e42e2946f19bd09e9c70075f4c03feea
RIPEMD160(WiresharkPortable-1.4.13.paf.exe)=c1eae87feb9bd061c45e4d28a6483b455ee0c1f3

Wireshark 1.4.13 Intel 32.dmg: 47928387 bytes
MD5(Wireshark 1.4.13 Intel 32.dmg)=3afcb3df249b4107efb1a93259a783c8
SHA1(Wireshark 1.4.13 Intel
32.dmg)=37023a2184aae18dd426891cf4f936907eb11cc9
RIPEMD160(Wireshark 1.4.13 Intel
32.dmg)=737348cf356d153b09437ee4e9f2af3fb57526a1

Wireshark 1.4.13 PPC 32.dmg: 50473141 bytes
MD5(Wireshark 1.4.13 PPC 32.dmg)=342a8b8ae3c4ebd9c1943a5283ff885c
SHA1(Wireshark 1.4.13 PPC 32.dmg)=fd5cb1520199cb93d8febc80aa23e799ed4fa62a
RIPEMD160(Wireshark 1.4.13 PPC
32.dmg)=dd5ae224e8e93df61452f34d99fa9528e046b6a0

Wireshark 1.4.13 Intel 64.dmg: 45633137 bytes
MD5(Wireshark 1.4.13 Intel 64.dmg)=ffd4a516c59e3819039ce9751753fbd7
SHA1(Wireshark 1.4.13 Intel
64.dmg)=4f2f780683b1a30cb7e27868fdb295f4d31d8b2c
RIPEMD160(Wireshark 1.4.13 Intel
64.dmg)=b1930b1d7f3a50ae27de6244ae2b20558a9de2f9

patch-wireshark-1.4.12-to-1.4.13.diff.bz2: 595197 bytes
MD5(patch-wireshark-1.4.12-to-1.4.13.diff.bz2)=4ee0567dc67615f3f00dc0546c1aeb93
SHA1(patch-wireshark-1.4.12-to-1.4.13.diff.bz2)=8d7fdb53e8c97c9769fb2328c75d14a593edbde6
RIPEMD160(patch-wireshark-1.4.12-to-1.4.13.diff.bz2)=b8ce7118784660496f9cd59d7326a13db3402057
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk+7100ACgkQpw8IXSHylJoGqgCfb5vy8HQR7P3M6ctlM3WtjxOG
7GUAnR07KHzrq6FlHL0g9hfM7viNnwgz
=9FIV
-----END PGP SIGNATURE-----