Wireshark-announce: [Wireshark-announce] Wireshark 1.12.4 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 04 Mar 2015 10:58:40 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 1.12.4.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed.
* [1]wnpa-sec-2015-06
The ATN-CPDLC dissector could crash. ([2]Bug 9952) [3]CVE-2015-2187
* [4]wnpa-sec-2015-07
The WCP dissector could crash. ([5]Bug 10844) [6]CVE-2015-2188
* [7]wnpa-sec-2015-08
The pcapng file parser could crash. ([8]Bug 10895) [9]CVE-2015-2189
* [10]wnpa-sec-2015-09
The LLDP dissector could crash. ([11]Bug 10983) [12]CVE-2015-2190
* [13]wnpa-sec-2015-10
The TNEF dissector could go into an infinite loop. Discovered by
Vlad Tsyrklevich. ([14]Bug 11023) [15]CVE-2015-2191
* [16]wnpa-sec-2015-11
The SCSI OSD dissector could go into an infinite loop. Discovered
by Vlad Tsyrklevich. ([17]Bug 11024) [18]CVE-2015-2192
The following bugs have been fixed:
* RTP player crashes on decode of long call: BadAlloc (insufficient
resources for operation). ([19]Bug 2630)
* "Telephony->SCTP->Analyse This Association" crashes Wireshark on
manufactured SCTP packet. ([20]Bug 9849)
* IPv6 Mobility Header Link Layer Address is parsed incorrectly.
([21]Bug 10006)
* DNS NXT RR is parsed incorrectly. ([22]Bug 10615)
* IPv6 AUTH mobility option parses Mobility SPI and Authentication
Data incorrectly. ([23]Bug 10626)
* IPv6 Mobility Header Link-Layer Address Mobility Option is parsed
incorrectly. ([24]Bug 10627)
* HTTP chunked response includes data beyond the chunked response.
([25]Bug 10707)
* DHCP Option 125 Suboption: (1) option-len always expects 1 but
specification allows for more. ([26]Bug 10784)
* Incorrect decoding of IPv4 Interface/Neighbor Address sub-TLVs in
Extended IS Reachability TLV of IS-IS. ([27]Bug 10837)
* Little-endian OS X Bluetooth PacketLogger files aren't handled.
([28]Bug 10861)
* X.509 certificate serial number incorrectly interpreted as negative
number. ([29]Bug 10862)
* Malformed Packet on rsync-version with length 2. ([30]Bug 10863)
* ZigBee epoch time is incorrectly displayed in OTA cluster. ([31]Bug
10872)
* BGP EVPN - Route Type 4 - "Invalid length of IP Address" - "Expert
Info" shows a false error. ([32]Bug 10873)
* Bad bytes read for extended rnc id value in GTP dissector. ([33]Bug
10877)
* "ServiceChangeReasonStr" messages are not shown in txt generated by
tshark. ([34]Bug 10879)
* Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI.
([35]Bug 10897)
* MEGACO wrong decoding on media port. ([36]Bug 10898)
* Wrong media format. ([37]Bug 10899)
* BSSGP Status PDU decoding fault (missing Mandatory element (0x04)
BVCI for proper packet). ([38]Bug 10903)
* DNS LOC Precision missing units. ([39]Bug 10940)
* Packets on OpenBSD loopback decoded as raw not null. ([40]Bug
10956)
* Display Filter Macro unable to edit. ([41]Bug 10957)
* IPv6 Local Mobility Anchor Address mobility option code is treated
incorrectly. ([42]Bug 10961)
* SNTP server list improperly formatted in DHCPv6 packet details.
([43]Bug 10964)
* Juniper Packet Mirror dissector expects ipv6 flow label = 0.
([44]Bug 10976)
* NS Trace (NetScaler Trace) file format is not able to export
specified packets. ([45]Bug 10998)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
ACN, ANSI IS-637-A, AppleMIDI, ATN-CPDLC, BGP, BSSGP, CMIP, DHCP,
DHCPv6, DIS, DLM3, DMP, DNS, Extreme Networks, ForCES, FTAM, GMHDR, GSM
A BSSMAP, GSM A-bis OML, GSM MAP, GSM RLC MAC, GTP, H.248, H.264, HTTP,
IEEE 802.11, IPv6, IS-IS, ISMACryp, J1939, Juniper Jmirror, KDP, L2CAP,
LDAP, LLDP, MGCP, MIP6, NBNS, NET/ROM, Netflow, Novell PKIS, PANA,
PPPoE, RSL, RSYNC, RTMPT, RTP, SCSI OSD, SDP, SMB Pipe, SMPP,
SYNCHROPHASOR, TETRA, TiVoConnect, TNEF, USB HID, V.52, VSS-Monitoring,
X.509AF, Zebra, and ZigBee
New and Updated Capture File Support
NetScaler, PacketLogger, and Pcapng
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[46]http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [47]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([48]Bug 1419)
The BER dissector might infinitely loop. ([49]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([50]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([51]Bug 2234)
The 64-bit Windows installer does not support Kerberos decryption.
([52]Win64 development page)
Resolving ([53]Bug 9044) reopens ([54]Bug 3528) so that Wireshark no
longer automatically decodes gzip data when following a TCP stream.
Application crash when changing real-time option. ([55]Bug 4035)
Hex pane display issue after startup. ([56]Bug 4056)
Packet list rows are oversized. ([57]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
([58]Bug 4985)
__________________________________________________________________
Getting Help
Community support is available on [59]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [60]the web site.
Official Wireshark training and certification are available from
[61]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [62]Wireshark web site.
__________________________________________________________________
Last updated 2015-03-04 09:03:30 PST
References
1. https://www.wireshark.org/security/wnpa-sec-2015-06.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187
4. https://www.wireshark.org/security/wnpa-sec-2015-07.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188
7. https://www.wireshark.org/security/wnpa-sec-2015-08.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189
10. https://www.wireshark.org/security/wnpa-sec-2015-09.html
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190
13. https://www.wireshark.org/security/wnpa-sec-2015-10.html
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191
16. https://www.wireshark.org/security/wnpa-sec-2015-11.html
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2630
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9849
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10006
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10615
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10626
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10707
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10784
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10837
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10861
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10862
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10863
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10872
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10873
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10877
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10879
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10897
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10898
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10899
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10903
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10940
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10956
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10957
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10961
43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10964
44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10976
45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10998
46. http://www.wireshark.org/download.html
47. http://www.wireshark.org/download.html#thirdparty
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
52. http://wiki.wireshark.org/Development/Win64
53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
59. http://ask.wireshark.org/
60. http://www.wireshark.org/lists/
61. http://www.wiresharktraining.com/
62. http://www.wireshark.org/faq.html
Digests
wireshark-1.12.4.tar.bz2: 29257016 bytes
MD5(wireshark-1.12.4.tar.bz2)=acfa156fd35cb66c867b1ace992e4b5b
SHA1(wireshark-1.12.4.tar.bz2)=dbbd4090c02fe170f35b26fa26d8aba0b399c659
RIPEMD160(wireshark-1.12.4.tar.bz2)=54688b20fb8b0a7ebe652fb53425ff259313286e
Wireshark-win64-1.12.4.exe: 29836080 bytes
MD5(Wireshark-win64-1.12.4.exe)=f0d3d1aa6d245eab052d403127f68bb9
SHA1(Wireshark-win64-1.12.4.exe)=2787a4d03028eeb7150030351360242cdc4eab52
RIPEMD160(Wireshark-win64-1.12.4.exe)=4151c88f1413cdd7db3831403dfc282eb80a8e50
Wireshark-win32-1.12.4.exe: 23588136 bytes
MD5(Wireshark-win32-1.12.4.exe)=e530f1874d02ba63f695f5c5de86bdcb
SHA1(Wireshark-win32-1.12.4.exe)=23179144338e331037ac9350d2d1e6408f3cf7ba
RIPEMD160(Wireshark-win32-1.12.4.exe)=1f3c7d02cf1467f82d2f2116ef4f242989f54fe4
WiresharkPortable-1.12.4.paf.exe: 29880720 bytes
MD5(WiresharkPortable-1.12.4.paf.exe)=3c33042f1c48a5d2bc62a16a85dbc238
SHA1(WiresharkPortable-1.12.4.paf.exe)=8c96c98d83e44adce7d01907f5173796418af976
RIPEMD160(WiresharkPortable-1.12.4.paf.exe)=812050cc37dbde54ff498c203bafc5f7f66c468d
Wireshark 1.12.4 Intel 64.dmg: 26392204 bytes
MD5(Wireshark 1.12.4 Intel 64.dmg)=98d79ce11886f9eb9b954130cafe9c5c
SHA1(Wireshark 1.12.4 Intel 64.dmg)=e57ba60fdf13e7b273a97ae36bd47547cf5a5823
RIPEMD160(Wireshark 1.12.4 Intel
64.dmg)=bcf7857b3afe34a4fae2b9d6ab338da6e32002df
Wireshark 1.12.4 Intel 32.dmg: 21822008 bytes
MD5(Wireshark 1.12.4 Intel 32.dmg)=40bfdf78e69dc100796476bd432ec743
SHA1(Wireshark 1.12.4 Intel 32.dmg)=24868f5930a00cc0c5b86383bc1e71d39d1099b3
RIPEMD160(Wireshark 1.12.4 Intel
32.dmg)=947a65b6401a3d628382e6a1d1b757632f2d6b23
patch-wireshark-1.12.3-to-1.12.4.bz2: 338867 bytes
MD5(patch-wireshark-1.12.3-to-1.12.4.bz2)=9482de275f5aec9c7adbdb7627be43b3
SHA1(patch-wireshark-1.12.3-to-1.12.4.bz2)=d720a734e49f41e99148e0eb988aca5a4e0b7f5f
RIPEMD160(patch-wireshark-1.12.3-to-1.12.4.bz2)=74605d9b35a616f50303579ba53348f89bde1476
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAlT3VeAACgkQpw8IXSHylJrBVACfaO9JPTt7wLT3VUSVmyxu9DWv
O6IAn2ArO6D17YeSoim8Z8sVvoVypPXK
=uXF1
-----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-announce] Wireshark 1.10.13 is now available
- Next by Date: [Wireshark-announce] Wireshark 1.99.3 is now available
- Previous by thread: [Wireshark-announce] Wireshark 1.10.13 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.99.3 is now available
- Index(es):