Wireshark-announce: [Wireshark-announce] Wireshark 1.10.4 is now available

Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 17 Dec 2013 11:47:14 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.10.4.

     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2013-66
       The SIP dissector could go into an infinite loop.
       Discovered by Alain Botti. ([2]Bug 9388)
       Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
       [3]CVE-2013-7112
     * [4]wnpa-sec-2013-67
       The BSSGP dissector could crash. Discovered by Laurent
       Butti. ([5]Bug 9488)
       Versions affected: 1.10.0 to 1.10.3
       [6]CVE-2013-7113
     * [7]wnpa-sec-2013-68
       The NTLMSSP v2 dissector could crash. Discovered by Garming
       Sam.
       Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
       [8]CVE-2013-7114

   The following bugs have been fixed:
     * "On-the-wire" packet lengths are limited to 65535 bytes.
       ([9]Bug 8808, ws-buglink:9390)
     * Tx MCS set is not interpreted properly in WLAN beacon
       frame. ([10]Bug 8894)
     * VoIP Graph Analysis window - some calls are black. ([11]Bug
       8966)
     * Wireshark fails to decode single-line, multiple Contact:
       URIs in SIP responses. ([12]Bug 9031)
     * epan/follow.c - Incorrect "bytes missing in capture file"
       in "check_fragments" due to an unsigned int wraparound?.
       ([13]Bug 9112)
     * gsm_map doesn't decode MAPv3 reportSM-DeliveryStatus
       result. ([14]Bug 9382)
     * Incorrect NFSv4 FATTR4_SECURITY_LABEL value. ([15]Bug 9383)
     * Timestamp decoded for Gigamon trailer is not padded
       correctly. ([16]Bug 9433)
     * SEL Fast Message Bug-fix for Signed 16-bit Integer Fast
       Meter Messages. ([17]Bug 9435)
     * DNP3 Bug Fix for Analog Data Sign Bit Handling. ([18]Bug
       9442)
     * GSM SMS User Data header fill bits are wrong when using a 7
       bits ASCII / IA5 encoding. ([19]Bug 9478)
     * WCDMA RLC dissector cannot assemble PDUs with SNs skipped
       and wrap-arounded. ([20]Bug 9505)
     * DTLS: fix buffer overflow in mac check. ([21]Bug 9512)
     * [PATCH] Correct data length in SCSI_DATA_IN packets (within
       iSCSI). ([22]Bug 9521)
     * GSM SMS UDH EMS control expects 4 octets instead of 3 with
       OPTIONAL 4th. ([23]Bug 9550)
     * Fix "decode as ..." for packet-time.c. ([24]Bug 9563)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ANSI IS-637-A, BSSGP, DNP3, DVB-BAT, DVB-CI, GSM MAP, GSM SMS,
   IEEE 802.11, iSCSI, NFSv4, NTLMSSP v2, RLC, SEL FM, SIP, and
   Time

  New and Updated Capture File Support

   Pcap-ng.
     __________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available
   from [25]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [26]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([27]Bug
   1419)

   The BER dissector might infinitely loop. ([28]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([29]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([30]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([31]Win64 development page)

   Resolving ([32]Bug 9044) reopens ([33]Bug 3528) so that
   Wireshark no longer automatically decodes gzip data when
   following a TCP stream.

   Application crash when changing real-time option. ([34]Bug
   4035)

   Hex pane display issue after startup. ([35]Bug 4056)

   Packet list rows are oversized. ([36]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([37]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([38]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [39]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [40]the web site.

   Official Wireshark training and certification are available
   from [41]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [42]Wireshark web site.
     __________________________________________________________

   Last updated 2013-12-17 09:19:17 PST

References

   1. https://www.wireshark.org/security/wnpa-sec-2013-66.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9388
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
   4. https://www.wireshark.org/security/wnpa-sec-2013-67.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
   7. https://www.wireshark.org/security/wnpa-sec-2013-68.html
   8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8894
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8966
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9112
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9382
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9383
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9433
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9435
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9442
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9478
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9505
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9512
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9521
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9550
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9563
  25. http://www.wireshark.org/download.html
  26. http://www.wireshark.org/download.html#thirdparty
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  31. https://wiki.wireshark.org/Development/Win64
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  39. http://ask.wireshark.org/
  40. http://www.wireshark.org/lists/
  41. http://www.wiresharktraining.com/
  42. http://www.wireshark.org/faq.html


Digests

wireshark-1.10.4.tar.bz2: 26675167 bytes
MD5(wireshark-1.10.4.tar.bz2)=48b59af6c560adacd86078e9d4b109e5
SHA1(wireshark-1.10.4.tar.bz2)=da722f257968d5a8f8e7a6d7afb4b853d5e519b7
RIPEMD160(wireshark-1.10.4.tar.bz2)=844bb0001ecc754b3eb99015e7127147375ebd10

Wireshark-win32-1.10.4.exe: 22122608 bytes
MD5(Wireshark-win32-1.10.4.exe)=ef40385d96852e81ddb3fef70324e88b
SHA1(Wireshark-win32-1.10.4.exe)=0d27ce1411e3e635095417846441816074b0b5bd
RIPEMD160(Wireshark-win32-1.10.4.exe)=32e78fcdc47047bc5af97b1ac203556b9977d9fe

Wireshark-win64-1.10.4.exe: 27976248 bytes
MD5(Wireshark-win64-1.10.4.exe)=f6d21d40bc9628378cd85f86e4016d43
SHA1(Wireshark-win64-1.10.4.exe)=a0715737ac077f3a77f466da48eb3c19093d5efb
RIPEMD160(Wireshark-win64-1.10.4.exe)=04273965307f666871c014813b28ae5e729b90a6

Wireshark-1.10.4.u3p: 30597773 bytes
MD5(Wireshark-1.10.4.u3p)=22cbd0588618faaaa5bfd583ff92065b
SHA1(Wireshark-1.10.4.u3p)=fc858c767796883a3e0bf93940f9d3c83595b7cd
RIPEMD160(Wireshark-1.10.4.u3p)=1adc7b0235b273df365acbac9d415ad329a8baca

WiresharkPortable-1.10.4.paf.exe: 23483176 bytes
MD5(WiresharkPortable-1.10.4.paf.exe)=496a143dcc78e40e0d96a0e83fb46dca
SHA1(WiresharkPortable-1.10.4.paf.exe)=bc584b5ea9d36747381965d5eba00cc3068775e9
RIPEMD160(WiresharkPortable-1.10.4.paf.exe)=2960c06f17523c36e8f60cbe06abe3a81d1439e7

Wireshark 1.10.4 Intel 64.dmg: 24721159 bytes
MD5(Wireshark 1.10.4 Intel 64.dmg)=c04746d6cf2241b8cb4c4ffa096d5fc8
SHA1(Wireshark 1.10.4 Intel
64.dmg)=51969c2134d867f32ee4b03babb800826bae0277
RIPEMD160(Wireshark 1.10.4 Intel
64.dmg)=e1b8a00240b06408fa177758dad31c3c615ac715

Wireshark 1.10.4 Intel 32.dmg: 20419412 bytes
MD5(Wireshark 1.10.4 Intel 32.dmg)=a33fee9e9512c20fc9cc03a93e225a9f
SHA1(Wireshark 1.10.4 Intel
32.dmg)=6d227169fa9f8fedfedd90c6aa8bcd754272e396
RIPEMD160(Wireshark 1.10.4 Intel
32.dmg)=c1aabbb670098630f04bd23bd4acbaaf810e5e5b

patch-wireshark-1.10.3-to-1.10.4.bz2: 100208 bytes
MD5(patch-wireshark-1.10.3-to-1.10.4.bz2)=0db0c26d438b84fba8f511414f708474
SHA1(patch-wireshark-1.10.3-to-1.10.4.bz2)=dbec971de047fa69f391f564ff2cbeaddfc96eb2
RIPEMD160(patch-wireshark-1.10.3-to-1.10.4.bz2)=397a75bdb723d6d472775c7ee0ad98d049a2e3a5
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlKwqkIACgkQpw8IXSHylJrpUgCdEdLIKlq3lnu0/LqDk4+kB5jY
57kAoNFdAktiIq8qhFbJWE1Q50v7AsDs
=v98O
-----END PGP SIGNATURE-----