Wireshark-users: [Wireshark-users] Wireshark 2.2.7 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 1 Jun 2017 13:44:39 -0700
I'm proud to announce the release of Wireshark 2.2.7. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2017-22 Bazaar dissector infinite loop ([2]Bug 13599) [3]CVE-2017-9352 * [4]wnpa-sec-2017-23 DOF dissector read overflow ([5]Bug 13608) [6]CVE-2017-9348 * [7]wnpa-sec-2017-24 DHCP dissector read overflow ([8]Bug 13609, [9]Bug 13628) [10]CVE-2017-9351 * [11]wnpa-sec-2017-25 SoulSeek dissector infinite loop ([12]Bug 13631) [13]CVE-2017-9346 * [14]wnpa-sec-2017-26 DNS dissector infinite loop ([15]Bug 13633) [16]CVE-2017-9345 * [17]wnpa-sec-2017-27 DICOM dissector infinite loop ([18]Bug 13685) [19]CVE-2017-9349 * [20]wnpa-sec-2017-28 openSAFETY dissector memory exhaustion ([21]Bug 13649) [22]CVE-2017-9350 * [23]wnpa-sec-2017-29 BT L2CAP dissector divide by zero ([24]Bug 13701) [25]CVE-2017-9344 * [26]wnpa-sec-2017-30 MSNIP dissector crash ([27]Bug 13725) [28]CVE-2017-9343 * [29]wnpa-sec-2017-31 ROS dissector crash ([30]Bug 13637) [31]CVE-2017-9347 * [32]wnpa-sec-2017-32 RGMP dissector crash ([33]Bug 13646) [34]CVE-2017-9354 * [35]wnpa-sec-2017-33 IPv6 dissector crash ([36]Bug 13675) [37]CVE-2017-9353 The following bugs have been fixed: * DICOM dissection error. ([38]Bug 13164) * Qt: drag & drop of one column header in PacketList moves other columns. ([39]Bug 13183) * Can not export captured DICOM objects in version 2.2.5. ([40]Bug 13570) * False complain about bad checksum of ICMP extension header. ([41]Bug 13586) * LibFuzzer: ISUP dissector bug (isup.number_different_meaning). ([42]Bug 13588) * Dissector Bug, protocol BT ATT. ([43]Bug 13590) * Wireshark dispalys RRCConnectionReestablishmentRejectRRCConnectionReestablishmentRejec t in Info column. ([44]Bug 13595) * [oss-fuzz] UBSAN: shift exponent 105 is too large for 32-bit type int in packet-ositp.c:551:79. ([45]Bug 13606) * [oss-fuzz] UBSAN: shift exponent -77 is negative in packet-netflow.c:7717:23. ([46]Bug 13607) * [oss-fuzz] UBSAN: shift exponent 1959 is too large for 32-bit type int in packet-sigcomp.c:2128:28. ([47]Bug 13610) * [oss-fuzz] UBSAN: shift exponent 63 is too large for 32-bit type guint32 (aka unsigned int) in packet-rtcp.c:917:24. ([48]Bug 13611) * [oss-fuzz] UBSAN: shift exponent 70 is too large for 64-bit type guint64 (aka unsigned long) in dwarf.c:42:43. ([49]Bug 13616) * [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type int in packet-xot.c:260:23. ([50]Bug 13618) * [oss-fuzz] UBSAN: shift exponent -5 is negative in packet-sigcomp.c:1722:36. ([51]Bug 13619) * [oss-fuzz] UBSAN: index 2049 out of bounds for type char [2049] in packet-quakeworld.c:134:5. ([52]Bug 13624) * [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type int in packet-netsync.c:467:25. ([53]Bug 13639) * [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type int in packet-sigcomp.c:3857:24. ([54]Bug 13641) * [oss-fuzz] ASAN: stack-use-after-return epan/dissectors/packet-ieee80211.c:14341:23 in add_tagged_field. ([55]Bug 13662) * Welcome screen invalid capture filter wihtout WinPcap installed causes runtime error. ([56]Bug 13672) * SMB protocol parser does not parse SMB_COM_TRANSACTION2_SECONDARY (0x33) command correctly. ([57]Bug 13690) * SIP packets with SDP marked as malformed. ([58]Bug 13698) * [oss-fuzz] UBSAN: index 8 out of bounds for type gboolean const[8] in packet-ieee80211-radiotap.c:1836:12. ([59]Bug 13713) * Crash on "Show packet bytes..." context menu item click. ([60]Bug 13723) * DNP3 dissector does not properly decode packed variations with prefixed qualifiers. ([61]Bug 13733) New and Updated Features There are no new features in this release. New File Format Decoding Support There are no new file formats in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support Bazaar, BT ATT, BT L2CAP, DHCP, DICOM, DNP3, DNS, DOF, DWARF, ICMP, IEEE 802.11, IPv6, ISUP, LTE RRC, MSNIP, Netflow, Netsync, openSAFETY, OSITP, QUAKEWORLD, Radiotap, RGMP, ROS, RTCP, SIGCOMP, SMB, SoulSeek, and XOT New and Updated Capture File Support There is no new or updated capture file support in this release. New and Updated Capture Interfaces support There are no new or updated capture interfaces supported in this release. Major API Changes There are no major API changes in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [62]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [63]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([64]Bug 1419) The BER dissector might infinitely loop. ([65]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([66]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([67]Bug 2234) Application crash when changing real-time option. ([68]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. ([69]Bug 4985) Wireshark should let you work with multiple capture files. ([70]Bug 10488) Dell Backup and Recovery (DBAR) makes many Windows applications crash, including Wireshark. ([71]Bug 12036) __________________________________________________________________ Getting Help Community support is available on [72]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [73]the web site. Official Wireshark training and certification are available from [74]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [75]Wireshark web site. __________________________________________________________________ Last updated 2017-06-01 18:22:54 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2017-22.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9352 4. https://www.wireshark.org/security/wnpa-sec-2017-23.html 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9348 7. https://www.wireshark.org/security/wnpa-sec-2017-24.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628 10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9351 11. https://www.wireshark.org/security/wnpa-sec-2017-25.html 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631 13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9346 14. https://www.wireshark.org/security/wnpa-sec-2017-26.html 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633 16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9345 17. https://www.wireshark.org/security/wnpa-sec-2017-27.html 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685 19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9349 20. https://www.wireshark.org/security/wnpa-sec-2017-28.html 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649 22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350 23. https://www.wireshark.org/security/wnpa-sec-2017-29.html 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 25. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9344 26. https://www.wireshark.org/security/wnpa-sec-2017-30.html 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725 28. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9343 29. https://www.wireshark.org/security/wnpa-sec-2017-31.html 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 31. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9347 32. https://www.wireshark.org/security/wnpa-sec-2017-32.html 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646 34. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9354 35. https://www.wireshark.org/security/wnpa-sec-2017-33.html 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675 37. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9353 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13164 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13183 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13570 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13586 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13588 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13590 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13595 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13606 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13607 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13610 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13611 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13616 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13618 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13619 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13639 54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13641 55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13662 56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13672 57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13690 58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13698 59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13713 60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13723 61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13733 62. https://www.wireshark.org/download.html 63. https://www.wireshark.org/download.html#thirdparty 64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 66. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 67. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 68. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 69. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 70. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 71. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036 72. https://ask.wireshark.org/ 73. https://www.wireshark.org/lists/ 74. http://www.wiresharktraining.com/ 75. https://www.wireshark.org/faq.html Digests wireshark-2.2.7.tar.bz2: 32309420 bytes SHA256(wireshark-2.2.7.tar.bz2)=689ddf62221b152779d8846ab5b2063cc7fd41ec1a9f04eefab09b5d5486dbb5 RIPEMD160(wireshark-2.2.7.tar.bz2)=baf598f495c04f3709cb02c9046b8176f5f5c72e SHA1(wireshark-2.2.7.tar.bz2)=2bb1cdf56a93fb22a66e8179214b587c71f06c9e MD5(wireshark-2.2.7.tar.bz2)=a4d880554c7f925dafef60fa313b580d Wireshark-win64-2.2.7.exe: 49400720 bytes SHA256(Wireshark-win64-2.2.7.exe)=cc8e6feff1e72d1baaafb277e33c9137a76a5edeca629fe4c764070a0719df50 RIPEMD160(Wireshark-win64-2.2.7.exe)=e1b5395752ff672593bb02e02c9d43b969a6d136 SHA1(Wireshark-win64-2.2.7.exe)=bb9f0c2f8448069e8ef33302e3e8a5182a066788 MD5(Wireshark-win64-2.2.7.exe)=30570a7b54c17da897cf155e35a2f44a Wireshark-win32-2.2.7.exe: 44550128 bytes SHA256(Wireshark-win32-2.2.7.exe)=6f5ef2ed9aed62f3613f66b960f50663cfb4ec4b59c9fe1fa11ff08137c8a0c0 RIPEMD160(Wireshark-win32-2.2.7.exe)=14aa5ae001272ac7ce1eea2d166f02b89a1de76c SHA1(Wireshark-win32-2.2.7.exe)=1c778e2885fbf0668f75567841d0b00c73b9c7d6 MD5(Wireshark-win32-2.2.7.exe)=ab254d59f70aec9178aeb8a76a24de50 WiresharkPortable_2.2.7.paf.exe: 46147736 bytes SHA256(WiresharkPortable_2.2.7.paf.exe)=3fc82830a4d2b0d620ef37c1fd406d99e5cad7ff2c831b1d284f5e87282ae2c1 RIPEMD160(WiresharkPortable_2.2.7.paf.exe)=2d699d1fe6d1bd2e30000cff21837d17d069725f SHA1(WiresharkPortable_2.2.7.paf.exe)=5cc73524dfc49780ce22f8dfe4d74876c2f9eb5a MD5(WiresharkPortable_2.2.7.paf.exe)=d05d04a6ce82a7253949d45cc5fb6186 Wireshark 2.2.7 Intel 64.dmg: 32873230 bytes SHA256(Wireshark 2.2.7 Intel 64.dmg)=6d46e7270fc6b661ece24c0fcaf56c7e4ce4f65501ef055ea46c6cfdf95c6dcb RIPEMD160(Wireshark 2.2.7 Intel 64.dmg)=7b1ab739f9dc24c03b9b825a8533e0e891ee822f SHA1(Wireshark 2.2.7 Intel 64.dmg)=50fa591d6fb0d4f59a5c2c9c12c1f114522f8377 MD5(Wireshark 2.2.7 Intel 64.dmg)=2814af6a4f0c851e1d44213d96428919
Attachment:
signature.asc
Description: OpenPGP digital signature
- Next by Date: [Wireshark-users] Wireshark 2.0.13 is now available
- Next by thread: [Wireshark-users] Wireshark 2.0.13 is now available
- Index(es):