Wireshark-users: [Wireshark-users] Wireshark 1.6.14 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 06 Mar 2013 15:29:31 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.6.14. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerability has been fixed. o wnpa-sec-2012-32 The sFlow dissector could go into an infinite loop. (Bug 7789) Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.13. CVE-2012-6054 o wnpa-sec-2012-33 The SCTP dissector could go into an infinite loop. (Bug 7802) Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.13. CVE-2012-6056 o wnpa-sec-2013-13 The MS-MMS dissector could crash. Discovered by Laurent Butti. (Bug 8382) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2478 o wnpa-sec-2013-15 The RTPS and RTPS2 dissectors could crash. Discovered by Alyssa Milburn. (Bug 8332) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2480 o wnpa-sec-2013-16 The Mount dissector could crash. Discovered by Alyssa Milburn. (Bug 8335) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2481 o wnpa-sec-2013-17 The AMPQ dissector could go into an infinite loop. Discovered by Moshe Kaplan. (Bug 8337) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2482 o wnpa-sec-2013-18 The ACN dissector could attempt to divide by zero. Discovered by Alyssa Milburn. (Bug 8340) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2483 o wnpa-sec-2013-19 The CIMD dissector could crash. Discovered by Moshe Kaplan. (Bug 8346) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2484 o wnpa-sec-2013-20 The FCSP dissector could go into an infinite loop. Discovered by Moshe Kaplan. (Bug 8359) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2485 o wnpa-sec-2013-22 The DTLS dissector could crash. Discovered by Laurent Butti. (Bug 8380) Versions affected: 1.8.0 to 1.8.5, 1.6.0 to 1.6.13. CVE-2013-2488 The following bugs have been fixed: o Lua pinfo.cols.protocol not holding value in postdissector. (Bug 6020) o Data combined via ssl_desegment_app_data not visible via "Follow SSL Stream" only decrypted ssl data tabs. (Bug 6434) o HTTP application/json-rpc should be decoded/shown as application/json. (Bug 7939) o WMM TSPEC Element Parsing is not done is wrong due to a wrong switch case number. (Bug 8320) o [BACnet] UCS-2 strings longer than 127 characters do not decode correctly. (Bug 8331) o Netflow dissector flowDurationMicroseconds nanosecond conversion wrong. (Bug 8410) o BE (3) AC is wrongly named as "Video" in (qos_acs). (Bug 8432) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ACN, AMQP, BACnet, CIMD, DOCSIS TLVs, DTLS, FCSP, FMP/NOTIFY, IEEE 802.11, JSON, Mount, MS-MMS, Netflow, RTPS, RTPS2, SIP, SSL New and Updated Capture File Support No new or updated capture file support. Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with libsmi. (Win64 development page) "Closing File!" Dialog Hangs. (Bug 3046) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times when displayed as a custom column. (Bug 4985) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Official Wireshark training and certification are available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.6.14.tar.bz2: 22121915 bytes MD5(wireshark-1.6.14.tar.bz2)=7f81e1b9db6f240d4f995eeebbf520fa SHA1(wireshark-1.6.14.tar.bz2)=bce7993968ab1227b6492584cadf93faf7807965 RIPEMD160(wireshark-1.6.14.tar.bz2)=9077b3c61d6d73db6cb9e61ab29c468aab9b6c3b wireshark-win32-1.6.14.exe: 19894582 bytes MD5(wireshark-win32-1.6.14.exe)=f008f1f72022387379d54d3f08551d98 SHA1(wireshark-win32-1.6.14.exe)=a93a4ef14881e4a740959331e5eb9dd1c3a7d069 RIPEMD160(wireshark-win32-1.6.14.exe)=fc42f39d650e531c30f0498d1c6903a638dcb4d8 wireshark-win64-1.6.14.exe: 23016951 bytes MD5(wireshark-win64-1.6.14.exe)=4a02eeeb3e831324ee12987f4f418ae9 SHA1(wireshark-win64-1.6.14.exe)=a70c60ffa6a78fdddb694f51580fe82ab98c04e1 RIPEMD160(wireshark-win64-1.6.14.exe)=04ad4e36a8b49ad0158afb1c63c0f22453717f4d wireshark-1.6.14.u3p: 26773823 bytes MD5(wireshark-1.6.14.u3p)=944ee685c491b7c44cdbc613dcb0dad1 SHA1(wireshark-1.6.14.u3p)=65993854226e7e7d9cdef0fd2c455237e60c570d RIPEMD160(wireshark-1.6.14.u3p)=7852c4f68144704c6e74e4bdb2d7f94fa448ae30 WiresharkPortable-1.6.14.paf.exe: 20666928 bytes MD5(WiresharkPortable-1.6.14.paf.exe)=181154ea5c12484a3d1837ca15d0b24d SHA1(WiresharkPortable-1.6.14.paf.exe)=8354156a481832a0ffb4927f38b9a8ca1cb9d6de RIPEMD160(WiresharkPortable-1.6.14.paf.exe)=b003934bc22c0a7c426c50c21a889c090b9ed938 Wireshark 1.6.14 Intel 64.dmg: 20374433 bytes MD5(Wireshark 1.6.14 Intel 64.dmg)=cb0bc1e8bcf44373f2d0b62d508ae468 SHA1(Wireshark 1.6.14 Intel 64.dmg)=16f3ba96b3b298eb3ceb063ee08de795ef348494 RIPEMD160(Wireshark 1.6.14 Intel 64.dmg)=deb7f23841fd903072256472c2ae959ac2d3c51c Wireshark 1.6.14 Intel 32.dmg: 20570644 bytes MD5(Wireshark 1.6.14 Intel 32.dmg)=7aab194d9d13003e6d1676b059542dc4 SHA1(Wireshark 1.6.14 Intel 32.dmg)=0c396f2f1dd9cc58b8d180077639b69538ef1197 RIPEMD160(Wireshark 1.6.14 Intel 32.dmg)=32db7764844b9642aa37d8f7e85163c509fa1e74 Wireshark 1.6.14 PPC 32.dmg: 21289314 bytes MD5(Wireshark 1.6.14 PPC 32.dmg)=f6f50ec9b7be659b1ad4844128c8db88 SHA1(Wireshark 1.6.14 PPC 32.dmg)=d0a6b932236ad7d223d69dae566dcad64089ec7e RIPEMD160(Wireshark 1.6.14 PPC 32.dmg)=bb9e8a3b4bdbab4268cb4274cfb01d4e11a0316b patch-wireshark-1.6.13-to-1.6.14.diff.bz2: 348802 bytes MD5(patch-wireshark-1.6.13-to-1.6.14.diff.bz2)=2fc00d82d6e7cb65dc67f5b9145129e6 SHA1(patch-wireshark-1.6.13-to-1.6.14.diff.bz2)=f7a8f9d7598b55b116f4e7e1d897462df5fee7d9 RIPEMD160(patch-wireshark-1.6.13-to-1.6.14.diff.bz2)=2e7e09985e270026c47c8d552116dcf269fba8b0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (Darwin) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlE30VsACgkQpw8IXSHylJoHEwCZAcforaC0RgnG62e3W3jWSBi4 IKMAnj5nxZ9vzWM+Yg9gwBzKcRwnXEDW =kS6w -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-users] Wireshark 1.8.6 is now available
- Next by Date: [Wireshark-users] Decoding through wireshark
- Previous by thread: [Wireshark-users] Wireshark 1.8.6 is now available
- Next by thread: [Wireshark-users] Decoding through wireshark
- Index(es):