Wireshark-announce: [Wireshark-announce] Wireshark 1.8.12 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 17 Dec 2013 11:47:42 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.8.12. __________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed. * [1]wnpa-sec-2013-66 The SIP dissector could go into an infinite loop. Discovered by Alain Botti. ([2]Bug 9388) Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11 [3]CVE-2013-7112 * [4]wnpa-sec-2013-68 The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. ([5]Bug 9488) Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11 [6]CVE-2013-7114 The following bugs have been fixed: * "On-the-wire" packet lengths are limited to 65535 bytes. ([7]Bug 8808, ws-buglink:9390) * Crash when selecting "Decode As" based on SCTP PPID. ([8]Bug 8976) * Wireshark fails to decode single-line, multiple Contact: URIs in SIP responses. ([9]Bug 9031) * gsm_map doesn't decode MAPv3 reportSM-DeliveryStatus result. ([10]Bug 9382) * DTLS: fix buffer overflow in mac check. ([11]Bug 9512) * Correct data length in SCSI_DATA_IN packets (within iSCSI). ([12]Bug 9521) * Fix "decode as ..." for packet-time.c. ([13]Bug 9563) * GSM SMS UDH EMS control expects 4 octets instead of 3 with OPTIONAL 4th. ([14]Bug 9550) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support DTLS, DVB-BAT, DVB-CI, GSM MAP, GSM SMS, iSCSI, SCTP, SIP, and Time New and Updated Capture File Support Pcap-ng. Getting Wireshark Wireshark source code and installation packages are available from [15]http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [16]download page on the Wireshark web site. __________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([17]Bug 1419) The BER dissector might infinitely loop. ([18]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([19]Bug 1814) Filtering tshark captures with display filters (-R) no longer works. ([20]Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. ([21]Win64 development page) Application crash when changing real-time option. ([22]Bug 4035) Hex pane display issue after startup. ([23]Bug 4056) Packet list rows are oversized. ([24]Bug 4357) Summary pane selected frame highlighting not maintained. ([25]Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. ([26]Bug 4985) __________________________________________________________ Getting Help Community support is available on [27]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [28]the web site. Official Wireshark training and certification are available from [29]Wireshark University. __________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [30]Wireshark web site. __________________________________________________________ Last updated 2013-12-17 09:22:53 PST References 1. https://www.wireshark.org/security/wnpa-sec-2013-66.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9388 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112 4. https://www.wireshark.org/security/wnpa-sec-2013-68.html 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8976 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9382 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9512 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9521 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9563 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9550 15. http://www.wireshark.org/download.html 16. http://www.wireshark.org/download.html#thirdparty 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 21. https://wiki.wireshark.org/Development/Win64 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 27. http://ask.wireshark.org/ 28. http://www.wireshark.org/lists/ 29. http://www.wiresharktraining.com/ 30. http://www.wireshark.org/faq.html Digests wireshark-1.8.12.tar.bz2: 24132271 bytes MD5(wireshark-1.8.12.tar.bz2)=64a979ded9197899aed6953a8d7759b0 SHA1(wireshark-1.8.12.tar.bz2)=737acadc9d14a02e19275c512d31675844cbc559 RIPEMD160(wireshark-1.8.12.tar.bz2)=f7b38247e29825d125deb316218b56184221762f Wireshark-win64-1.8.12.exe: 26413104 bytes MD5(Wireshark-win64-1.8.12.exe)=d27ef78ca6211145a979853b0b2eb5f4 SHA1(Wireshark-win64-1.8.12.exe)=a0ddb928eff06f8c6f610097673e40f8d2770922 RIPEMD160(Wireshark-win64-1.8.12.exe)=0e6ba1d81f7d44e76782b9ea6345504d5fdb9842 Wireshark-win32-1.8.12.exe: 20752936 bytes MD5(Wireshark-win32-1.8.12.exe)=d16e3e084a5afc677cc30341727b056c SHA1(Wireshark-win32-1.8.12.exe)=e8378596adbac60d3086afda462529bc597a3a75 RIPEMD160(Wireshark-win32-1.8.12.exe)=8f2af3d47062c5ce93909197f7f040f2d1ef841d Wireshark-1.8.12.u3p: 28443112 bytes MD5(Wireshark-1.8.12.u3p)=9939236a4cba82a204282a1ecd28e9fa SHA1(Wireshark-1.8.12.u3p)=9918d81e69d41b4d51006df0f6f02c7ae01a5fda RIPEMD160(Wireshark-1.8.12.u3p)=4a7aa29abc74f501d8cd5204cf64012b1134c785 WiresharkPortable-1.8.12.paf.exe: 21936144 bytes MD5(WiresharkPortable-1.8.12.paf.exe)=81cbf1eaa676764dd80cb1ecb61602d9 SHA1(WiresharkPortable-1.8.12.paf.exe)=ee5c07e2c116289371f762ed22faf13d92cf2e89 RIPEMD160(WiresharkPortable-1.8.12.paf.exe)=3450fd30b2f3f230fd8068210e92e16212370ca7 Wireshark 1.8.12 PPC 32.dmg: 22772335 bytes MD5(Wireshark 1.8.12 PPC 32.dmg)=dd98f786aeb25ba58f0ec1239af12f5f SHA1(Wireshark 1.8.12 PPC 32.dmg)=f8813c0e6fbe236bc47cedbc2d72fe277b052920 RIPEMD160(Wireshark 1.8.12 PPC 32.dmg)=a4bfeac2a32ee4ad6de9ff2594064c0d4b263ddf Wireshark 1.8.12 Intel 64.dmg: 21810474 bytes MD5(Wireshark 1.8.12 Intel 64.dmg)=8b072ca52b45fd95ba496d709ae42f7e SHA1(Wireshark 1.8.12 Intel 64.dmg)=fa782ae7f1b03f46a0ed6e7e99fdd71ca10cbf4d RIPEMD160(Wireshark 1.8.12 Intel 64.dmg)=61b2c2965d33204dcec5c6385ccb19b020ee7723 Wireshark 1.8.12 Intel 32.dmg: 18308507 bytes MD5(Wireshark 1.8.12 Intel 32.dmg)=67e8e5ed7599193c129ed42044f2c542 SHA1(Wireshark 1.8.12 Intel 32.dmg)=41840996681af498308978b6bac505d0f67ac893 RIPEMD160(Wireshark 1.8.12 Intel 32.dmg)=5a3c3d609e38f3165b38149389cb23e7c4be197b patch-wireshark-1.8.11-to-1.8.12.diff.bz2: 72700 bytes MD5(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=d6106886a1890d9768e608703c9616e5 SHA1(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=0814434c278f4342efe3e68219383a80035319ea RIPEMD160(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=9e3d729409d30b054fc56530f3d8f27012a82dca -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (Darwin) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlKwql4ACgkQpw8IXSHylJplZwCfXfGJ7S9O5weu3TAQgatIrBGK SekAn3q35tDVtlrPnDc8l1GlPcCzGxkn =+lM7 -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-announce] Wireshark 1.10.4 is now available
- Next by Date: [Wireshark-announce] Wireshark 1.10.5 is now available
- Previous by thread: [Wireshark-announce] Wireshark 1.10.4 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.10.5 is now available
- Index(es):