Wireshark-dev: [Wireshark-dev] Wireshark 2.0.12 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 12 Apr 2017 15:05:23 -0700
I'm proud to announce the release of Wireshark 2.0.12.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2017-04 RTMTP dissector infinite loop ([2]Bug 13347)
[3]CVE-2017-6472
* [4]wnpa-sec-2017-12
IMAP dissector crash ([5]Bug 13466) [6]CVE-2017-7703
* [7]wnpa-sec-2017-13
WBMXL dissector infinite loop ([8]Bug 13477) [9]CVE-2017-7702
* [10]wnpa-sec-2017-14
NetScaler file parser infinite loop ([11]Bug 13478)
[12]CVE-2017-7700
* [13]wnpa-sec-2017-15
RPCoRDMA dissector infinite loop ([14]Bug 13558) [15]CVE-2017-7705
* [16]wnpa-sec-2017-16
BGP dissector infinite loop ([17]Bug 13557) [18]CVE-2017-7701
* [19]wnpa-sec-2017-18
PacketBB dissector crash ([20]Bug 13559)
* [21]wnpa-sec-2017-19
SLSK dissector long loop ([22]Bug 13576)
* [23]wnpa-sec-2017-20
SIGCOMP dissector infinite loop ([24]Bug 13578)
* [25]wnpa-sec-2017-21
WSP dissector infinite loop ([26]Bug 13581)
The following bugs have been fixed:
* T30 FCF byte decoding masks DTC, CIG and NCS. ([27]Bug 1918)
* Wireshark gives decoding error during rnsap message dissection(SCCP
reassembly). ([28]Bug 3360)
* Payload in 2 SCCP DT1 messages in the same frame isn't
(sub)dissected. ([29]Bug 11130)
* Qt UI: Wireshark crash when deleting IO graph string while it's in
editing mode. ([30]Bug 13234)
* Crash on exit due to an invalid frame data sequence state. ([31]Bug
13433)
* Some bytes ignored in every packet in NetScaler packet trace when
vmnames are included in packet headers. ([32]Bug 13459)
* Lua dissector: ProtoField int&42; do not allow FT_HEX or FT_OCT,
crash when set to FT_HEX_DEC or FT_DEC_HEX. ([33]Bug 13484)
* GIOP LocateRequest v1.0 is improperly indicated as "malformed".
([34]Bug 13488)
* Bug in ZigBee - Zone Status Change Notification. ([35]Bug 13493)
* Packet exception in packet-ua3g and incomplete strings in
packet-noe. ([36]Bug 13502)
* Wrong BGP capability dissect. ([37]Bug 13521)
* Endpoint statistics column labels seem incorrect. ([38]Bug 13526)
* When a Lua enum or bool preference is changed via context menu,
prefs_changed isn't called with Qt Wireshark. ([39]Bug 13536)
* tshark's -z endpoints,ip ignores optional filter. ([40]Bug 13538)
* libfuzzer: PEEKREMOTE dissector bug. ([41]Bug 13544)
* libfuzzer: packetBB dissector bug (packetbb.msg.addr.valuecustom).
([42]Bug 13545)
* libfuzzer: WSP dissector bug (wsp.header.x_wap_tod). ([43]Bug
13546)
* libfuzzer: MIH dissector bug. ([44]Bug 13547)
* libfuzzer: DNS dissector bug. ([45]Bug 13548)
* libfuzzer: WLCCP dissector bug. ([46]Bug 13549)
* libfuzzer: TAPA dissector bug. ([47]Bug 13553)
* libfuzzer: lapsat dissector bug. ([48]Bug 13554)
* libfuzzer: wassp dissector bug. ([49]Bug 13555)
* SSH Dissector uses incorrect length for protocol field
(ssh.protocol). ([50]Bug 13574)
* NBAP malformed packet for short Binding ID. ([51]Bug 13577)
* libfuzzer: WSP dissector bug (wsp.header.x_up_1.x_up_proxy_tod).
([52]Bug 13579)
* RTPproxy dissector adds multi lines to info column. ([53]Bug 13582)
* libfuzzer: asterix dissector bug (asterix.021_230_RA). ([54]Bug
13580)
New and Updated Features
There are no new features in this release.
New File Format Decoding Support
There are no new file formats in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
ASTERIX, BGP, BT AVRCP, DNS, EAPOL-MKA, GIOP, ICMP, IEEE 802.15.4,
IMAP, ISIS LSP, iSNS, LAPSat, MIH, MySQL, NBAP, PacketBB, PEEKREMOTE,
RPCoRDMA, RTMTP, RTPproxy, SCCP, SIGCOMP, SLSK, SSH, T.30, TAPA, UA3G,
WASSP, WBXML, WLCCP, WSP, and ZigBee ZCL IAS
New and Updated Capture File Support
There is no new or updated capture file support in this release.
NetScaler
New and Updated Capture Interfaces support
There are no new or updated capture interfaces supported in this
release.
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[55]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [56]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([57]Bug 1419)
The BER dissector might infinitely loop. ([58]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([59]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([60]Bug 2234)
Application crash when changing real-time option. ([61]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
([62]Bug 4985)
Wireshark should let you work with multiple capture files. ([63]Bug
10488)
Dell Backup and Recovery (DBAR) makes many Windows applications crash,
including Wireshark. ([64]Bug 12036)
__________________________________________________________________
Getting Help
Community support is available on [65]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [66]the web site.
Official Wireshark training and certification are available from
[67]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [68]Wireshark web site.
__________________________________________________________________
Last updated 2017-04-12 19:40:57 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2017-04.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6472
4. https://www.wireshark.org/security/wnpa-sec-2017-12.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7703
7. https://www.wireshark.org/security/wnpa-sec-2017-13.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7702
10. https://www.wireshark.org/security/wnpa-sec-2017-14.html
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7700
13. https://www.wireshark.org/security/wnpa-sec-2017-15.html
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7705
16. https://www.wireshark.org/security/wnpa-sec-2017-16.html
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7701
19. https://www.wireshark.org/security/wnpa-sec-2017-18.html
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13559
21. https://www.wireshark.org/security/wnpa-sec-2017-19.html
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13576
23. https://www.wireshark.org/security/wnpa-sec-2017-20.html
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13578
25. https://www.wireshark.org/security/wnpa-sec-2017-21.html
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13581
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1918
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3360
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11130
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13234
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13433
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13459
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13484
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13488
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13493
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13502
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13521
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13526
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13536
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13538
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13544
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13545
43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13546
44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13547
45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13548
46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13549
47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13553
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13554
49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13555
50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13574
51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13577
52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13579
53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13582
54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13580
55. https://www.wireshark.org/download.html
56. https://www.wireshark.org/download.html#thirdparty
57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
65. https://ask.wireshark.org/
66. https://www.wireshark.org/lists/
67. http://www.wiresharktraining.com/
68. https://www.wireshark.org/faq.html
Digests
wireshark-2.0.12.tar.bz2: 31239318 bytes
SHA256(wireshark-2.0.12.tar.bz2)=77301794445712088d283c1a9f4dfd6da835227ed4921bf68255b8c16ffef2d1
RIPEMD160(wireshark-2.0.12.tar.bz2)=94506c7b0711b02cd156226d22d1c826178aa8dc
SHA1(wireshark-2.0.12.tar.bz2)=c996e40e0c5e52ccfa148d7b82f72d9ea615d9c0
MD5(wireshark-2.0.12.tar.bz2)=fc19863d2b50fededd5cf120f5d9803a
Wireshark-win32-2.0.12.exe: 44165176 bytes
SHA256(Wireshark-win32-2.0.12.exe)=455a84e45441220d6c2b3085c9c130f3c5ce2aebd73f23d3487c337d412def25
RIPEMD160(Wireshark-win32-2.0.12.exe)=ca10bb49336fe8c01d59b9b1e85fa17896482441
SHA1(Wireshark-win32-2.0.12.exe)=b8a8e321b0b2101a5f2587205c83dc90d28b1460
MD5(Wireshark-win32-2.0.12.exe)=7f56ec2fbfa185826f9b0b1615c329c5
Wireshark-win64-2.0.12.exe: 47787120 bytes
SHA256(Wireshark-win64-2.0.12.exe)=c924eb9d3edefcc0d63eba28326eafd649be6c38962608c42c5b854fe10a20a5
RIPEMD160(Wireshark-win64-2.0.12.exe)=4fdfbb1fa835e80288ec7f1205ffe7dd9c4923e1
SHA1(Wireshark-win64-2.0.12.exe)=9c7c227ce1e988b39985f594b1cc0d6be0ba0bf7
MD5(Wireshark-win64-2.0.12.exe)=c019195e62395b491f094aa2762a2117
WiresharkPortable_2.0.12.paf.exe: 43849680 bytes
SHA256(WiresharkPortable_2.0.12.paf.exe)=03d32527ea198826ba8fece3ea3f8ef9a3e2816dfb3832f67cc7cadb44e9094f
RIPEMD160(WiresharkPortable_2.0.12.paf.exe)=24b3dbb5c702ff283d49218a1ae6ebaae6961e2f
SHA1(WiresharkPortable_2.0.12.paf.exe)=1891982152deef9437a35b178fd5b8735ef973cd
MD5(WiresharkPortable_2.0.12.paf.exe)=a7439b2742580c4b4bcb1f20a742ece3
Wireshark 2.0.12 Intel 64.dmg: 31767009 bytes
SHA256(Wireshark 2.0.12 Intel
64.dmg)=7777c248884435d18cfe5c442d1a82040e08538e86e2b01a78796ee0524891c4
RIPEMD160(Wireshark 2.0.12 Intel
64.dmg)=4159093b9e6b24975f844c0588b1546990b4b457
SHA1(Wireshark 2.0.12 Intel 64.dmg)=aaabf6feb05a5cb5df8ef32cb2266f4eb6a4c8c5
MD5(Wireshark 2.0.12 Intel 64.dmg)=6fd0355179867c1a8391e2c1e2812249
Wireshark 2.0.12 Intel 32.dmg: 32520773 bytes
SHA256(Wireshark 2.0.12 Intel
32.dmg)=3a69829e5ea7ec31bb26262aa4546e85459371c728ecc5432d049355c0c4f465
RIPEMD160(Wireshark 2.0.12 Intel
32.dmg)=2327187c541c1f9c2ad35e612c9af61133c788a8
SHA1(Wireshark 2.0.12 Intel 32.dmg)=efb373f13092567848f4202e666b6f510b0bc0e5
MD5(Wireshark 2.0.12 Intel 32.dmg)=a1d200dcc5acfdd52e715a8388364843
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-dev] Wireshark 2.2.6 is now available
- Next by Date: [Wireshark-dev] Wireshark 2.2.6 is now available
- Previous by thread: [Wireshark-dev] Wireshark 2.2.6 is now available
- Next by thread: [Wireshark-dev] epan_t and capture_file
- Index(es):