Wireshark-dev: [Wireshark-dev] Wireshark 1.8.5 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 29 Jan 2013 13:53:37 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.8.5. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. o wnpa-sec-2013-01 Infinite and large loops in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors. Reported by Laurent Butti. (Bugs 8036, 8037, 8038, 8040, 8041, 8042, 8043, 8198, 8199, 8222) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-02 The CLNP dissector could crash. Discovered independently by Laurent Butti and the Wireshark development team. (Bug 7871) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-03 The DTN dissector could crash. (Bug 7945) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-04 The MS-MMC dissector (and possibly others) could crash. (Bug 8112) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-05 The DTLS dissector could crash. Discovered by Laurent Butti. (Bug 8111) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-06 The ROHC dissector could crash. (Bug 7679) Versions affected: 1.8.0 to 1.8.4. o wnpa-sec-2013-07 The DCP-ETSI dissector could corrupt memory. Discovered by Laurent Butti. (Bug 8213) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-08 The Wireshark dissection engine could crash. Discovered by Laurent Butti. (Bug 8197) Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. o wnpa-sec-2013-09 The NTLMSSP dissector could overflow a buffer. Discovered by Ulf Härnhammar. Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12. The following bugs have been fixed: o SNMPv3 Engine ID registration. (Bug 2426) o Wrong decoding of gtp.target identification. (Bug 3974) o Reassemble.c leaks memory for GLIB > 2.8. (Bug 4141) o Wireshark crashes when starting due to out-of-date plugin left behind from earlier installation. (Bug 7401) o Failed to dissect TLS handshake packets. (Bug 7435) o ISUP dissector problem with empty Generic Number. (Bug 7632) o Illegal character is used in temporary capture file name. (Bug 7877) o Lua code crashes wireshark after update to 1.8.3. (Bug 7976) o Timestamp info is not saved correctly when writing DOS Sniffer files. (Bug 7998) o 1.8.3 Wireshark User's Guide version is 1.6. (Bug 8009) o Core dumped when the file is closed. (Bug 8022) o LPP is misspelled in APDU parameter in e-CIDMeasurementInitiation request for LPPA message. (Bug 8023) o Wrong packet bytes are selected for ISUP CUG binary code. (Bug 8035) o Decodes FCoE Group Multicast MAC address as Broadcom MAC address. (Bug 8046) o The SSL dissector stops decrypting the SSL conversation with Malformed Packet:SSL error messages. (Bug 8075) o Unable to Save/Apply [Unistim Port] in Preferences. (Bug 8078) o Some Information Elements in GTPv2 are not dissected correctly. (Bug 8079) o Wrong bytes highlighted with "Find Packet...". (Bug 8085) o 3GPP ULI AVP. SAI is not correctly decoded. (Bug 8098) o Wireshark does not show "Start and End Time" information for Cisco Netflow/IPFIX with type 154 to 157. (Bug 8105) o GPRS Tunnel Protocoll GTP Version 1 does not decode DAF flag in Common Flags IE. (Bug 8193) o Wrong parcing of ULI of gtpv2 messages - errors in SAC, RAC & ECI. (Bug 8208) o Version Number in EtherIP dissector. (Bug 8211) o Warn Dissector bug, protocol JXTA. (Bug 8212) o Electromagnetic Emission Parser parses field Event Id as Entity Id. (Bug 8227) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ANSI IS-637-A, ASN.1 PER, AX.25, Bluetooth HCI, CLNP, CSN.1, DCP-ETSI, DIAMETER, DIS PDU, DOCSIS CM-STATUS, DTLS, DTN, EtherIP, Fibre Channel, GPRS, GTP, GTPv2, HomePlug AV, IEEE 802.3 Slow, IEEE 802.15.4, ISUP, JXTA, LAPD, LPPa, MPLS, MS-MMC, NAS-EPS, NTLMSSP, ROHC, RSL, RTPS, SDP, SIP, SNMP, SSL New and Updated Capture File Support DOS Sniffer Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. (Win64 development page) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Official Wireshark training and certification are available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.8.5.tar.bz2: 24196532 bytes MD5(wireshark-1.8.5.tar.bz2)=fde40a8d4555cab12271e67f9778f5d5 SHA1(wireshark-1.8.5.tar.bz2)=76c719d92a2e200588a5452bbe61178b915eb99b RIPEMD160(wireshark-1.8.5.tar.bz2)=ecf67d55cd2d9218c28335163ede3969a9776d97 Wireshark-win64-1.8.5.exe: 26860800 bytes MD5(Wireshark-win64-1.8.5.exe)=ed774df3452f186619094df62fe13d16 SHA1(Wireshark-win64-1.8.5.exe)=062d5ffbf43fa89794c4ccaa2628daf4d76f4ac6 RIPEMD160(Wireshark-win64-1.8.5.exe)=14a260091f82083b88eeefb0397468762924be53 Wireshark-win32-1.8.5.exe: 21166192 bytes MD5(Wireshark-win32-1.8.5.exe)=659e81ba08448f40e8b51f82e48d07c7 SHA1(Wireshark-win32-1.8.5.exe)=8dacc70405038a1b4e1d74d297a4dfa04f3ec806 RIPEMD160(Wireshark-win32-1.8.5.exe)=5c5b79bccd003e1a191dc156f84fc16daf2b0ce1 Wireshark-1.8.5.u3p: 28593651 bytes MD5(Wireshark-1.8.5.u3p)=bbff3cb7a0752f335bea9f4686a2825a SHA1(Wireshark-1.8.5.u3p)=92e757d82630864c78b336fe654cb7e2aa3c490e RIPEMD160(Wireshark-1.8.5.u3p)=e14cfb73b9faae96f6e854562b443e665f57cb5e WiresharkPortable-1.8.5.paf.exe: 22069160 bytes MD5(WiresharkPortable-1.8.5.paf.exe)=6649ce85e593eccbbdb3a33e320be883 SHA1(WiresharkPortable-1.8.5.paf.exe)=6b60392d6033a2d8763b8366c0af587ba55c9ecc RIPEMD160(WiresharkPortable-1.8.5.paf.exe)=45fb67b70d6cef377c3e1dd6ad3f1d8a3f586af0 Wireshark 1.8.5 Intel 32.dmg: 22108772 bytes MD5(Wireshark 1.8.5 Intel 32.dmg)=bc6dbe8125199b320eab26dc3f301843 SHA1(Wireshark 1.8.5 Intel 32.dmg)=f826da7ef51bde41487ae348fb1048d5c1d6d5c0 RIPEMD160(Wireshark 1.8.5 Intel 32.dmg)=9b8596a18072909793de47c5f89da2542328fc5b Wireshark 1.8.5 PPC 32.dmg: 22908606 bytes MD5(Wireshark 1.8.5 PPC 32.dmg)=cd7f51cfae4798e5463feabbbe524e2e SHA1(Wireshark 1.8.5 PPC 32.dmg)=b6e3f1816a5dcedfd3462629158b7de1b0eefb54 RIPEMD160(Wireshark 1.8.5 PPC 32.dmg)=d42cf92bdf904ec814609cc817f897ffea18add7 Wireshark 1.8.5 Intel 64.dmg: 21787064 bytes MD5(Wireshark 1.8.5 Intel 64.dmg)=682eaf21d3393ce0dc73e8ee10bd85d6 SHA1(Wireshark 1.8.5 Intel 64.dmg)=7e3ced1be71d8042ba19aa3dcf779fde360466c9 RIPEMD160(Wireshark 1.8.5 Intel 64.dmg)=2abeddb0b37a8e459d9e7042aa33d5f787e7cbce patch-wireshark-1.8.4-to-1.8.5.diff.bz2: 240007 bytes MD5(patch-wireshark-1.8.4-to-1.8.5.diff.bz2)=772cf8a7e5581ead075d1022e52df4ba SHA1(patch-wireshark-1.8.4-to-1.8.5.diff.bz2)=19bdabcdbdb2f6261c2183db1d5c73a2efbaf937 RIPEMD160(patch-wireshark-1.8.4-to-1.8.5.diff.bz2)=861a073d9347a105e6449600488d3ffa4bcc0c53 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (Darwin) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlEIROEACgkQpw8IXSHylJpmqACgi6NwqYGgWATCS37nxh8gsM5N eI8AoKR1h+z0VSKlsHy3H/wwAIofqlit =SR/6 -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-dev] How does wireshark filter packets
- Next by Date: [Wireshark-dev] Wireshark 1.6.13 is now available
- Previous by thread: Re: [Wireshark-dev] How does wireshark filter packets
- Next by thread: [Wireshark-dev] Wireshark 1.6.13 is now available
- Index(es):