Wireshark-announce: [Wireshark-announce] Wireshark 1.10.4 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 17 Dec 2013 11:47:14 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 1.10.4.
__________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol
analyzer. It is used for troubleshooting, analysis, development
and education.
__________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed.
* [1]wnpa-sec-2013-66
The SIP dissector could go into an infinite loop.
Discovered by Alain Botti. ([2]Bug 9388)
Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
[3]CVE-2013-7112
* [4]wnpa-sec-2013-67
The BSSGP dissector could crash. Discovered by Laurent
Butti. ([5]Bug 9488)
Versions affected: 1.10.0 to 1.10.3
[6]CVE-2013-7113
* [7]wnpa-sec-2013-68
The NTLMSSP v2 dissector could crash. Discovered by Garming
Sam.
Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
[8]CVE-2013-7114
The following bugs have been fixed:
* "On-the-wire" packet lengths are limited to 65535 bytes.
([9]Bug 8808, ws-buglink:9390)
* Tx MCS set is not interpreted properly in WLAN beacon
frame. ([10]Bug 8894)
* VoIP Graph Analysis window - some calls are black. ([11]Bug
8966)
* Wireshark fails to decode single-line, multiple Contact:
URIs in SIP responses. ([12]Bug 9031)
* epan/follow.c - Incorrect "bytes missing in capture file"
in "check_fragments" due to an unsigned int wraparound?.
([13]Bug 9112)
* gsm_map doesn't decode MAPv3 reportSM-DeliveryStatus
result. ([14]Bug 9382)
* Incorrect NFSv4 FATTR4_SECURITY_LABEL value. ([15]Bug 9383)
* Timestamp decoded for Gigamon trailer is not padded
correctly. ([16]Bug 9433)
* SEL Fast Message Bug-fix for Signed 16-bit Integer Fast
Meter Messages. ([17]Bug 9435)
* DNP3 Bug Fix for Analog Data Sign Bit Handling. ([18]Bug
9442)
* GSM SMS User Data header fill bits are wrong when using a 7
bits ASCII / IA5 encoding. ([19]Bug 9478)
* WCDMA RLC dissector cannot assemble PDUs with SNs skipped
and wrap-arounded. ([20]Bug 9505)
* DTLS: fix buffer overflow in mac check. ([21]Bug 9512)
* [PATCH] Correct data length in SCSI_DATA_IN packets (within
iSCSI). ([22]Bug 9521)
* GSM SMS UDH EMS control expects 4 octets instead of 3 with
OPTIONAL 4th. ([23]Bug 9550)
* Fix "decode as ..." for packet-time.c. ([24]Bug 9563)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
ANSI IS-637-A, BSSGP, DNP3, DVB-BAT, DVB-CI, GSM MAP, GSM SMS,
IEEE 802.11, iSCSI, NFSv4, NTLMSSP v2, RLC, SEL FM, SIP, and
Time
New and Updated Capture File Support
Pcap-ng.
__________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available
from [25]http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark
packages. You can usually install or upgrade Wireshark using
the package management system specific to that platform. A list
of third-party packages can be found on the [26]download page
on the Wireshark web site.
__________________________________________________________
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About->Folders to find the default locations on your system.
__________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([27]Bug
1419)
The BER dissector might infinitely loop. ([28]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([29]Bug 1814)
Filtering tshark captures with read filters (-R) no longer
works. ([30]Bug 2234)
The 64-bit Windows installer does not support Kerberos
decryption. ([31]Win64 development page)
Resolving ([32]Bug 9044) reopens ([33]Bug 3528) so that
Wireshark no longer automatically decodes gzip data when
following a TCP stream.
Application crash when changing real-time option. ([34]Bug
4035)
Hex pane display issue after startup. ([35]Bug 4056)
Packet list rows are oversized. ([36]Bug 4357)
Summary pane selected frame highlighting not maintained.
([37]Bug 4445)
Wireshark and TShark will display incorrect delta times in some
cases. ([38]Bug 4985)
__________________________________________________________
Getting Help
Community support is available on [39]Wireshark's Q&A site and
on the wireshark-users mailing list. Subscription information
and archives for all of Wireshark's mailing lists can be found
on [40]the web site.
Official Wireshark training and certification are available
from [41]Wireshark University.
__________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [42]Wireshark web site.
__________________________________________________________
Last updated 2013-12-17 09:19:17 PST
References
1. https://www.wireshark.org/security/wnpa-sec-2013-66.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9388
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
4. https://www.wireshark.org/security/wnpa-sec-2013-67.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
7. https://www.wireshark.org/security/wnpa-sec-2013-68.html
8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8894
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8966
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9112
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9382
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9383
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9433
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9435
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9442
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9478
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9505
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9512
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9521
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9550
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9563
25. http://www.wireshark.org/download.html
26. http://www.wireshark.org/download.html#thirdparty
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
31. https://wiki.wireshark.org/Development/Win64
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
39. http://ask.wireshark.org/
40. http://www.wireshark.org/lists/
41. http://www.wiresharktraining.com/
42. http://www.wireshark.org/faq.html
Digests
wireshark-1.10.4.tar.bz2: 26675167 bytes
MD5(wireshark-1.10.4.tar.bz2)=48b59af6c560adacd86078e9d4b109e5
SHA1(wireshark-1.10.4.tar.bz2)=da722f257968d5a8f8e7a6d7afb4b853d5e519b7
RIPEMD160(wireshark-1.10.4.tar.bz2)=844bb0001ecc754b3eb99015e7127147375ebd10
Wireshark-win32-1.10.4.exe: 22122608 bytes
MD5(Wireshark-win32-1.10.4.exe)=ef40385d96852e81ddb3fef70324e88b
SHA1(Wireshark-win32-1.10.4.exe)=0d27ce1411e3e635095417846441816074b0b5bd
RIPEMD160(Wireshark-win32-1.10.4.exe)=32e78fcdc47047bc5af97b1ac203556b9977d9fe
Wireshark-win64-1.10.4.exe: 27976248 bytes
MD5(Wireshark-win64-1.10.4.exe)=f6d21d40bc9628378cd85f86e4016d43
SHA1(Wireshark-win64-1.10.4.exe)=a0715737ac077f3a77f466da48eb3c19093d5efb
RIPEMD160(Wireshark-win64-1.10.4.exe)=04273965307f666871c014813b28ae5e729b90a6
Wireshark-1.10.4.u3p: 30597773 bytes
MD5(Wireshark-1.10.4.u3p)=22cbd0588618faaaa5bfd583ff92065b
SHA1(Wireshark-1.10.4.u3p)=fc858c767796883a3e0bf93940f9d3c83595b7cd
RIPEMD160(Wireshark-1.10.4.u3p)=1adc7b0235b273df365acbac9d415ad329a8baca
WiresharkPortable-1.10.4.paf.exe: 23483176 bytes
MD5(WiresharkPortable-1.10.4.paf.exe)=496a143dcc78e40e0d96a0e83fb46dca
SHA1(WiresharkPortable-1.10.4.paf.exe)=bc584b5ea9d36747381965d5eba00cc3068775e9
RIPEMD160(WiresharkPortable-1.10.4.paf.exe)=2960c06f17523c36e8f60cbe06abe3a81d1439e7
Wireshark 1.10.4 Intel 64.dmg: 24721159 bytes
MD5(Wireshark 1.10.4 Intel 64.dmg)=c04746d6cf2241b8cb4c4ffa096d5fc8
SHA1(Wireshark 1.10.4 Intel
64.dmg)=51969c2134d867f32ee4b03babb800826bae0277
RIPEMD160(Wireshark 1.10.4 Intel
64.dmg)=e1b8a00240b06408fa177758dad31c3c615ac715
Wireshark 1.10.4 Intel 32.dmg: 20419412 bytes
MD5(Wireshark 1.10.4 Intel 32.dmg)=a33fee9e9512c20fc9cc03a93e225a9f
SHA1(Wireshark 1.10.4 Intel
32.dmg)=6d227169fa9f8fedfedd90c6aa8bcd754272e396
RIPEMD160(Wireshark 1.10.4 Intel
32.dmg)=c1aabbb670098630f04bd23bd4acbaaf810e5e5b
patch-wireshark-1.10.3-to-1.10.4.bz2: 100208 bytes
MD5(patch-wireshark-1.10.3-to-1.10.4.bz2)=0db0c26d438b84fba8f511414f708474
SHA1(patch-wireshark-1.10.3-to-1.10.4.bz2)=dbec971de047fa69f391f564ff2cbeaddfc96eb2
RIPEMD160(patch-wireshark-1.10.3-to-1.10.4.bz2)=397a75bdb723d6d472775c7ee0ad98d049a2e3a5
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iEYEARECAAYFAlKwqkIACgkQpw8IXSHylJrpUgCdEdLIKlq3lnu0/LqDk4+kB5jY
57kAoNFdAktiIq8qhFbJWE1Q50v7AsDs
=v98O
-----END PGP SIGNATURE-----
- Next by Date: [Wireshark-announce] Wireshark 1.8.12 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.8.12 is now available
- Index(es):