Wireshark-announce: [Wireshark-announce] Wireshark 1.8.12 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 17 Dec 2013 11:47:42 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 1.8.12.
__________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol
analyzer. It is used for troubleshooting, analysis, development
and education.
__________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed.
* [1]wnpa-sec-2013-66
The SIP dissector could go into an infinite loop.
Discovered by Alain Botti. ([2]Bug 9388)
Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
[3]CVE-2013-7112
* [4]wnpa-sec-2013-68
The NTLMSSP v2 dissector could crash. Discovered by Garming
Sam. ([5]Bug 9488)
Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
[6]CVE-2013-7114
The following bugs have been fixed:
* "On-the-wire" packet lengths are limited to 65535 bytes.
([7]Bug 8808, ws-buglink:9390)
* Crash when selecting "Decode As" based on SCTP PPID.
([8]Bug 8976)
* Wireshark fails to decode single-line, multiple Contact:
URIs in SIP responses. ([9]Bug 9031)
* gsm_map doesn't decode MAPv3 reportSM-DeliveryStatus
result. ([10]Bug 9382)
* DTLS: fix buffer overflow in mac check. ([11]Bug 9512)
* Correct data length in SCSI_DATA_IN packets (within iSCSI).
([12]Bug 9521)
* Fix "decode as ..." for packet-time.c. ([13]Bug 9563)
* GSM SMS UDH EMS control expects 4 octets instead of 3 with
OPTIONAL 4th. ([14]Bug 9550)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
DTLS, DVB-BAT, DVB-CI, GSM MAP, GSM SMS, iSCSI, SCTP, SIP, and
Time
New and Updated Capture File Support
Pcap-ng.
Getting Wireshark
Wireshark source code and installation packages are available
from [15]http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark
packages. You can usually install or upgrade Wireshark using
the package management system specific to that platform. A list
of third-party packages can be found on the [16]download page
on the Wireshark web site.
__________________________________________________________
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About->Folders to find the default locations on your system.
__________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([17]Bug
1419)
The BER dissector might infinitely loop. ([18]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([19]Bug 1814)
Filtering tshark captures with display filters (-R) no longer
works. ([20]Bug 2234)
The 64-bit Windows installer does not support Kerberos
decryption. ([21]Win64 development page)
Application crash when changing real-time option. ([22]Bug
4035)
Hex pane display issue after startup. ([23]Bug 4056)
Packet list rows are oversized. ([24]Bug 4357)
Summary pane selected frame highlighting not maintained.
([25]Bug 4445)
Wireshark and TShark will display incorrect delta times in some
cases. ([26]Bug 4985)
__________________________________________________________
Getting Help
Community support is available on [27]Wireshark's Q&A site and
on the wireshark-users mailing list. Subscription information
and archives for all of Wireshark's mailing lists can be found
on [28]the web site.
Official Wireshark training and certification are available
from [29]Wireshark University.
__________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [30]Wireshark web site.
__________________________________________________________
Last updated 2013-12-17 09:22:53 PST
References
1. https://www.wireshark.org/security/wnpa-sec-2013-66.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9388
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
4. https://www.wireshark.org/security/wnpa-sec-2013-68.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8976
9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9382
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9512
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9521
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9563
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9550
15. http://www.wireshark.org/download.html
16. http://www.wireshark.org/download.html#thirdparty
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
21. https://wiki.wireshark.org/Development/Win64
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
27. http://ask.wireshark.org/
28. http://www.wireshark.org/lists/
29. http://www.wiresharktraining.com/
30. http://www.wireshark.org/faq.html
Digests
wireshark-1.8.12.tar.bz2: 24132271 bytes
MD5(wireshark-1.8.12.tar.bz2)=64a979ded9197899aed6953a8d7759b0
SHA1(wireshark-1.8.12.tar.bz2)=737acadc9d14a02e19275c512d31675844cbc559
RIPEMD160(wireshark-1.8.12.tar.bz2)=f7b38247e29825d125deb316218b56184221762f
Wireshark-win64-1.8.12.exe: 26413104 bytes
MD5(Wireshark-win64-1.8.12.exe)=d27ef78ca6211145a979853b0b2eb5f4
SHA1(Wireshark-win64-1.8.12.exe)=a0ddb928eff06f8c6f610097673e40f8d2770922
RIPEMD160(Wireshark-win64-1.8.12.exe)=0e6ba1d81f7d44e76782b9ea6345504d5fdb9842
Wireshark-win32-1.8.12.exe: 20752936 bytes
MD5(Wireshark-win32-1.8.12.exe)=d16e3e084a5afc677cc30341727b056c
SHA1(Wireshark-win32-1.8.12.exe)=e8378596adbac60d3086afda462529bc597a3a75
RIPEMD160(Wireshark-win32-1.8.12.exe)=8f2af3d47062c5ce93909197f7f040f2d1ef841d
Wireshark-1.8.12.u3p: 28443112 bytes
MD5(Wireshark-1.8.12.u3p)=9939236a4cba82a204282a1ecd28e9fa
SHA1(Wireshark-1.8.12.u3p)=9918d81e69d41b4d51006df0f6f02c7ae01a5fda
RIPEMD160(Wireshark-1.8.12.u3p)=4a7aa29abc74f501d8cd5204cf64012b1134c785
WiresharkPortable-1.8.12.paf.exe: 21936144 bytes
MD5(WiresharkPortable-1.8.12.paf.exe)=81cbf1eaa676764dd80cb1ecb61602d9
SHA1(WiresharkPortable-1.8.12.paf.exe)=ee5c07e2c116289371f762ed22faf13d92cf2e89
RIPEMD160(WiresharkPortable-1.8.12.paf.exe)=3450fd30b2f3f230fd8068210e92e16212370ca7
Wireshark 1.8.12 PPC 32.dmg: 22772335 bytes
MD5(Wireshark 1.8.12 PPC 32.dmg)=dd98f786aeb25ba58f0ec1239af12f5f
SHA1(Wireshark 1.8.12 PPC 32.dmg)=f8813c0e6fbe236bc47cedbc2d72fe277b052920
RIPEMD160(Wireshark 1.8.12 PPC
32.dmg)=a4bfeac2a32ee4ad6de9ff2594064c0d4b263ddf
Wireshark 1.8.12 Intel 64.dmg: 21810474 bytes
MD5(Wireshark 1.8.12 Intel 64.dmg)=8b072ca52b45fd95ba496d709ae42f7e
SHA1(Wireshark 1.8.12 Intel
64.dmg)=fa782ae7f1b03f46a0ed6e7e99fdd71ca10cbf4d
RIPEMD160(Wireshark 1.8.12 Intel
64.dmg)=61b2c2965d33204dcec5c6385ccb19b020ee7723
Wireshark 1.8.12 Intel 32.dmg: 18308507 bytes
MD5(Wireshark 1.8.12 Intel 32.dmg)=67e8e5ed7599193c129ed42044f2c542
SHA1(Wireshark 1.8.12 Intel
32.dmg)=41840996681af498308978b6bac505d0f67ac893
RIPEMD160(Wireshark 1.8.12 Intel
32.dmg)=5a3c3d609e38f3165b38149389cb23e7c4be197b
patch-wireshark-1.8.11-to-1.8.12.diff.bz2: 72700 bytes
MD5(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=d6106886a1890d9768e608703c9616e5
SHA1(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=0814434c278f4342efe3e68219383a80035319ea
RIPEMD160(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=9e3d729409d30b054fc56530f3d8f27012a82dca
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iEYEARECAAYFAlKwql4ACgkQpw8IXSHylJplZwCfXfGJ7S9O5weu3TAQgatIrBGK
SekAn3q35tDVtlrPnDc8l1GlPcCzGxkn
=+lM7
-----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-announce] Wireshark 1.10.4 is now available
- Next by Date: [Wireshark-announce] Wireshark 1.10.5 is now available
- Previous by thread: [Wireshark-announce] Wireshark 1.10.4 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.10.5 is now available
- Index(es):