Wireshark-announce: [Wireshark-announce] Wireshark 1.8.4 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 28 Nov 2012 14:05:47 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 1.8.4.
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer.
It is used for troubleshooting, analysis, development and
education.
What's New
Bug Fixes
The following vulnerabilities have been fixed.
o wnpa-sec-2012-30
Wireshark could leak potentially sensitive host name
resolution information when working with multiple pcap-ng
files. Discovered by Laura Chappell.
Versions affected: 1.8.0 to 1.8.3.
o wnpa-sec-2012-31
The USB dissector could go into an infinite loop. (Bug 7787)
Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.
o wnpa-sec-2012-32
The sFlow dissector could go into an infinite loop. (Bug 7789)
Versions affected: 1.8.0 to 1.8.3.
o wnpa-sec-2012-33
The SCTP dissector could go into an infinite loop. (Bug 7802)
Versions affected: 1.8.0 to 1.8.3.
o wnpa-sec-2012-34
The EIGRP dissector could go into an infinite loop. (Bug 7800)
Versions affected: 1.8.0 to 1.8.3.
o wnpa-sec-2012-35
The ISAKMP dissector could crash. (Bug 7855)
Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.
o wnpa-sec-2012-36
The iSCSI dissector could go into an infinite loop. (Bug 7858)
Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.
o wnpa-sec-2012-37
The WTP dissector could go into an infinite loop. (Bug 7869)
Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.
o wnpa-sec-2012-38
The RTCP dissector could go into an infinite loop. (Bug 7879)
Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.
o wnpa-sec-2012-39
The 3GPP2 A11 dissector could go into an infinite loop. (Bug
7801)
Versions affected: 1.8.0 to 1.8.3.
o wnpa-sec-2012-40
The ICMPv6 dissector could go into an infinite loop. (Bug
7844)
Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.
The following bugs have been fixed:
o Menu and Title bars inaccessible using GTK2 (non-legacy) with
two monitors. (Bug 553)
o 802.11 Probe Response fails to parse. (Bug 1284)
o Tshark - decimal symbol. (Bug 2880)
o Malformed tpncp.dat file can crash Wireshark. (Bug 6665)
o SSL decryption not work even with example capture file and
key. (Bug 6869)
o Info line is incorrect on SIP message containing another SIP
message in body. (Bug 7780)
o OOPS: dissector table "sctp.ppi" doesn't exist Protocol being
registered is "Datagram Transport Layer Security". (Bug 7784)
o Dissection of IEEE 802.11 Channel Switch Announcement element
fails. (Bug 7797)
o Invalid memory accesses when loading RADIUS captures. (Bug
7803)
o ISUP CIC should have format BASE_DEC, not BASE_HEX. (Bug 7848)
o We don't handle pcap-ng files with IDBs that come after packet
blocks. (Bug 7851)
o '*' wildcard in the 'Src IP' or 'Dest IP' field of the ESP SA
dialog does not work. (Bug 7866)
o nas_eps dissector does not decode some esm message. (Bug 7912)
o WLAN decryption status not updated after updating WEP/WPA
keys. (Bug 7921)
o IPv6 Option Pad1 Incorrect dissection. (Bug 7938)
o Print GNUTLS error message if PEM import fails. (Bug 7948)
o GSM classmark3 8-PSK decode error. (Bug 7964)
o Parsing the Server Name Indication extension in SSL/TLS
traffic reads some fields incorrectly. (Bug 7967)
o Lua code crashes wireshark after update to 1.8.3. (Bug 7976)
o 2 bugs in Ran-Information-Error Rim Container. (Bug 8000)
o Misspelling (typo) in IPv6 display filter field name. (Bug
8006)
o Two BSSGP dissector bugs. (Bug 8008)
o Core dump during SCTP association analysis. (Bug 8011)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
3GPP2 A11, BSSGP, EIGRP, FMP/NOTIFY, GSM A, ICMP, ICMPv6, IEEE
802.11, IPsec, IPv6, ISAKMP, iSCSI, LTE RRC, NAS EPS, NDPS, Prism,
RADIUS, RRC, RTCP, SCTP, sFlow, SIP, SMB2, SSL/TLS, TPNCP, USB
New and Updated Capture File Support
CommView NCF, iSeries, pcap-ng.
Getting Wireshark
Wireshark source code and installation packages are available from
http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages.
You can usually install or upgrade Wireshark using the package
management system specific to that platform. A list of third-party
packages can be found on the download page on the Wireshark web
site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About→Folders to find the default locations on your system.
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)
The BER dissector might infinitely loop. (Bug 1516)
Capture filters aren't applied when capturing from named pipes.
(Bug 1814)
Filtering tshark captures with display filters (-R) no longer
works. (Bug 2234)
The 64-bit Windows installer does not support Kerberos decryption.
(Win64 development page)
Application crash when changing real-time option. (Bug 4035)
Hex pane display issue after startup. (Bug 4056)
Packet list rows are oversized. (Bug 4357)
Summary pane selected frame highlighting not maintained. (Bug
4445)
Wireshark and TShark will display incorrect delta times in some
cases. (Bug 4985)
Getting Help
Community support is available on Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and
archives for all of Wireshark's mailing lists can be found on the
web site.
Official Wireshark training and certification are available from
Wireshark University.
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site.
Digests
wireshark-1.8.4.tar.bz2: 24164286 bytes
MD5(wireshark-1.8.4.tar.bz2)=ce22aa0fe7ecb5af39c93ff905c7d026
SHA1(wireshark-1.8.4.tar.bz2)=00265d9196f030848c78025f30556cd014be843d
RIPEMD160(wireshark-1.8.4.tar.bz2)=73f00ccfe86239022679eb2c889bc4371a61942d
Wireshark-win32-1.8.4.exe: 20967680 bytes
MD5(Wireshark-win32-1.8.4.exe)=60ab55f541ad3f7443aeb6a4f40d42db
SHA1(Wireshark-win32-1.8.4.exe)=f430703d2eb258e242f604dbd4ccc276edceb3a7
RIPEMD160(Wireshark-win32-1.8.4.exe)=29553dc43ac7f1b88c1f6376096000b9443bb5c2
Wireshark-win64-1.8.4.exe: 26641872 bytes
MD5(Wireshark-win64-1.8.4.exe)=3ad27f8c8696727b839c06378be238a3
SHA1(Wireshark-win64-1.8.4.exe)=a2e4516476711221db3edaf66f490c8bb3fae955
RIPEMD160(Wireshark-win64-1.8.4.exe)=2a3c48f2efab5a610062901af3c21798b95fab7a
Wireshark-1.8.4.u3p: 28390010 bytes
MD5(Wireshark-1.8.4.u3p)=024440d6b5b577a072182d0087cc7648
SHA1(Wireshark-1.8.4.u3p)=c7308ab686b299b76808c7012997e8f92d6ff842
RIPEMD160(Wireshark-1.8.4.u3p)=de4028831644d14f25918a9aa148c5bc4c468f48
WiresharkPortable-1.8.4.paf.exe: 21982712 bytes
MD5(WiresharkPortable-1.8.4.paf.exe)=ddc683976227e3aa12f52abb125ad4c4
SHA1(WiresharkPortable-1.8.4.paf.exe)=a2f1a60bf7dddbd4f52493be69a294917ff65ce7
RIPEMD160(WiresharkPortable-1.8.4.paf.exe)=a3988c88385f002551263c90059754b0bd40369e
Wireshark 1.8.4 Intel 64.dmg: 21772874 bytes
MD5(Wireshark 1.8.4 Intel 64.dmg)=d766badd720f4ab81c4fea55ad4eb3ab
SHA1(Wireshark 1.8.4 Intel
64.dmg)=6287a8499130d9b5853f2a4a8055ca6db1590158
RIPEMD160(Wireshark 1.8.4 Intel
64.dmg)=b970b82a9b6a6d403e31c5d70693a423c5f298e8
Wireshark 1.8.4 Intel 32.dmg: 22088678 bytes
MD5(Wireshark 1.8.4 Intel 32.dmg)=9c2cf7b67cb8f6dad4adc36a8b34f09a
SHA1(Wireshark 1.8.4 Intel
32.dmg)=28b0a570c8ff3b1a8f8395ef08678b372aa88d50
RIPEMD160(Wireshark 1.8.4 Intel
32.dmg)=fd21b36db579a3693d1fe4b8b76614492b89a4e9
Wireshark 1.8.4 PPC 32.dmg: 22886742 bytes
MD5(Wireshark 1.8.4 PPC 32.dmg)=a034248098d1eb754c039c96e108913c
SHA1(Wireshark 1.8.4 PPC 32.dmg)=0a6bbddbb13e1eb15ad0ee96c6f3d87109ef94aa
RIPEMD160(Wireshark 1.8.4 PPC
32.dmg)=8c87209de4dac6bb435609e978da25b9b43c97e6
patch-wireshark-1.8.3-to-1.8.4.diff.bz2: 156695 bytes
MD5(patch-wireshark-1.8.3-to-1.8.4.diff.bz2)=7c3779962dc372e784991ba883df15e3
SHA1(patch-wireshark-1.8.3-to-1.8.4.diff.bz2)=b3778edb01befc809d3ceef35229db4dd338e589
RIPEMD160(patch-wireshark-1.8.3-to-1.8.4.diff.bz2)=59a7a5af7bee2d3136fec0ef2996c6521d23a6e5
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
iEYEARECAAYFAlC2irsACgkQpw8IXSHylJrIygCeLm9jbKlJWv7sle/EK4Duhlt5
HD8AoMqK4cQA/lW6YUOmygHu+U4DRIOp
=g7ln
-----END PGP SIGNATURE-----
- Next by Date: [Wireshark-announce] Wireshark 1.6.12 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.6.12 is now available
- Index(es):