Wireshark-announce: [Wireshark-announce] Wireshark 1.12.4 is now available

From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 04 Mar 2015 10:58:40 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.12.4.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2015-06
       The ATN-CPDLC dissector could crash. ([2]Bug 9952) [3]CVE-2015-2187
     * [4]wnpa-sec-2015-07
       The WCP dissector could crash. ([5]Bug 10844) [6]CVE-2015-2188
     * [7]wnpa-sec-2015-08
       The pcapng file parser could crash. ([8]Bug 10895) [9]CVE-2015-2189
     * [10]wnpa-sec-2015-09
       The LLDP dissector could crash. ([11]Bug 10983) [12]CVE-2015-2190
     * [13]wnpa-sec-2015-10
       The TNEF dissector could go into an infinite loop. Discovered by
       Vlad Tsyrklevich. ([14]Bug 11023) [15]CVE-2015-2191
     * [16]wnpa-sec-2015-11
       The SCSI OSD dissector could go into an infinite loop. Discovered
       by Vlad Tsyrklevich. ([17]Bug 11024) [18]CVE-2015-2192

   The following bugs have been fixed:
     * RTP player crashes on decode of long call: BadAlloc (insufficient
       resources for operation). ([19]Bug 2630)
     * "Telephony->SCTP->Analyse This Association" crashes Wireshark on
       manufactured SCTP packet. ([20]Bug 9849)
     * IPv6 Mobility Header Link Layer Address is parsed incorrectly.
       ([21]Bug 10006)
     * DNS NXT RR is parsed incorrectly. ([22]Bug 10615)
     * IPv6 AUTH mobility option parses Mobility SPI and Authentication
       Data incorrectly. ([23]Bug 10626)
     * IPv6 Mobility Header Link-Layer Address Mobility Option is parsed
       incorrectly. ([24]Bug 10627)
     * HTTP chunked response includes data beyond the chunked response.
       ([25]Bug 10707)
     * DHCP Option 125 Suboption: (1) option-len always expects 1 but
       specification allows for more. ([26]Bug 10784)
     * Incorrect decoding of IPv4 Interface/Neighbor Address sub-TLVs in
       Extended IS Reachability TLV of IS-IS. ([27]Bug 10837)
     * Little-endian OS X Bluetooth PacketLogger files aren't handled.
       ([28]Bug 10861)
     * X.509 certificate serial number incorrectly interpreted as negative
       number. ([29]Bug 10862)
     * Malformed Packet on rsync-version with length 2. ([30]Bug 10863)
     * ZigBee epoch time is incorrectly displayed in OTA cluster. ([31]Bug
       10872)
     * BGP EVPN - Route Type 4 - "Invalid length of IP Address" - "Expert
       Info" shows a false error. ([32]Bug 10873)
     * Bad bytes read for extended rnc id value in GTP dissector. ([33]Bug
       10877)
     * "ServiceChangeReasonStr" messages are not shown in txt generated by
       tshark. ([34]Bug 10879)
     * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI.
       ([35]Bug 10897)
     * MEGACO wrong decoding on media port. ([36]Bug 10898)
     * Wrong media format. ([37]Bug 10899)
     * BSSGP Status PDU decoding fault (missing Mandatory element (0x04)
       BVCI for proper packet). ([38]Bug 10903)
     * DNS LOC Precision missing units. ([39]Bug 10940)
     * Packets on OpenBSD loopback decoded as raw not null. ([40]Bug
       10956)
     * Display Filter Macro unable to edit. ([41]Bug 10957)
     * IPv6 Local Mobility Anchor Address mobility option code is treated
       incorrectly. ([42]Bug 10961)
     * SNTP server list improperly formatted in DHCPv6 packet details.
       ([43]Bug 10964)
     * Juniper Packet Mirror dissector expects ipv6 flow label = 0.
       ([44]Bug 10976)
     * NS Trace (NetScaler Trace) file format is not able to export
       specified packets. ([45]Bug 10998)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ACN, ANSI IS-637-A, AppleMIDI, ATN-CPDLC, BGP, BSSGP, CMIP, DHCP,
   DHCPv6, DIS, DLM3, DMP, DNS, Extreme Networks, ForCES, FTAM, GMHDR, GSM
   A BSSMAP, GSM A-bis OML, GSM MAP, GSM RLC MAC, GTP, H.248, H.264, HTTP,
   IEEE 802.11, IPv6, IS-IS, ISMACryp, J1939, Juniper Jmirror, KDP, L2CAP,
   LDAP, LLDP, MGCP, MIP6, NBNS, NET/ROM, Netflow, Novell PKIS, PANA,
   PPPoE, RSL, RSYNC, RTMPT, RTP, SCSI OSD, SDP, SMB Pipe, SMPP,
   SYNCHROPHASOR, TETRA, TiVoConnect, TNEF, USB HID, V.52, VSS-Monitoring,
   X.509AF, Zebra, and ZigBee

  New and Updated Capture File Support

   NetScaler, PacketLogger, and Pcapng
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [46]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [47]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([48]Bug 1419)

   The BER dissector might infinitely loop. ([49]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([50]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([51]Bug 2234)

   The 64-bit Windows installer does not support Kerberos decryption.
   ([52]Win64 development page)

   Resolving ([53]Bug 9044) reopens ([54]Bug 3528) so that Wireshark no
   longer automatically decodes gzip data when following a TCP stream.

   Application crash when changing real-time option. ([55]Bug 4035)

   Hex pane display issue after startup. ([56]Bug 4056)

   Packet list rows are oversized. ([57]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([58]Bug 4985)
     __________________________________________________________________

Getting Help

   Community support is available on [59]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [60]the web site.

   Official Wireshark training and certification are available from
   [61]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [62]Wireshark web site.
     __________________________________________________________________

   Last updated 2015-03-04 09:03:30 PST

References

   1. https://www.wireshark.org/security/wnpa-sec-2015-06.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187
   4. https://www.wireshark.org/security/wnpa-sec-2015-07.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188
   7. https://www.wireshark.org/security/wnpa-sec-2015-08.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
   9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189
  10. https://www.wireshark.org/security/wnpa-sec-2015-09.html
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
  12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190
  13. https://www.wireshark.org/security/wnpa-sec-2015-10.html
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
  15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191
  16. https://www.wireshark.org/security/wnpa-sec-2015-11.html
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
  18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2630
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9849
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10006
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10615
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10626
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10707
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10784
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10837
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10861
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10862
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10863
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10872
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10873
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10877
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10879
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10897
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10898
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10899
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10903
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10940
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10956
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10957
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10961
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10964
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10976
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10998
  46. http://www.wireshark.org/download.html
  47. http://www.wireshark.org/download.html#thirdparty
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  52. http://wiki.wireshark.org/Development/Win64
  53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  59. http://ask.wireshark.org/
  60. http://www.wireshark.org/lists/
  61. http://www.wiresharktraining.com/
  62. http://www.wireshark.org/faq.html


Digests

wireshark-1.12.4.tar.bz2: 29257016 bytes
MD5(wireshark-1.12.4.tar.bz2)=acfa156fd35cb66c867b1ace992e4b5b
SHA1(wireshark-1.12.4.tar.bz2)=dbbd4090c02fe170f35b26fa26d8aba0b399c659
RIPEMD160(wireshark-1.12.4.tar.bz2)=54688b20fb8b0a7ebe652fb53425ff259313286e

Wireshark-win64-1.12.4.exe: 29836080 bytes
MD5(Wireshark-win64-1.12.4.exe)=f0d3d1aa6d245eab052d403127f68bb9
SHA1(Wireshark-win64-1.12.4.exe)=2787a4d03028eeb7150030351360242cdc4eab52
RIPEMD160(Wireshark-win64-1.12.4.exe)=4151c88f1413cdd7db3831403dfc282eb80a8e50

Wireshark-win32-1.12.4.exe: 23588136 bytes
MD5(Wireshark-win32-1.12.4.exe)=e530f1874d02ba63f695f5c5de86bdcb
SHA1(Wireshark-win32-1.12.4.exe)=23179144338e331037ac9350d2d1e6408f3cf7ba
RIPEMD160(Wireshark-win32-1.12.4.exe)=1f3c7d02cf1467f82d2f2116ef4f242989f54fe4

WiresharkPortable-1.12.4.paf.exe: 29880720 bytes
MD5(WiresharkPortable-1.12.4.paf.exe)=3c33042f1c48a5d2bc62a16a85dbc238
SHA1(WiresharkPortable-1.12.4.paf.exe)=8c96c98d83e44adce7d01907f5173796418af976
RIPEMD160(WiresharkPortable-1.12.4.paf.exe)=812050cc37dbde54ff498c203bafc5f7f66c468d

Wireshark 1.12.4 Intel 64.dmg: 26392204 bytes
MD5(Wireshark 1.12.4 Intel 64.dmg)=98d79ce11886f9eb9b954130cafe9c5c
SHA1(Wireshark 1.12.4 Intel 64.dmg)=e57ba60fdf13e7b273a97ae36bd47547cf5a5823
RIPEMD160(Wireshark 1.12.4 Intel
64.dmg)=bcf7857b3afe34a4fae2b9d6ab338da6e32002df

Wireshark 1.12.4 Intel 32.dmg: 21822008 bytes
MD5(Wireshark 1.12.4 Intel 32.dmg)=40bfdf78e69dc100796476bd432ec743
SHA1(Wireshark 1.12.4 Intel 32.dmg)=24868f5930a00cc0c5b86383bc1e71d39d1099b3
RIPEMD160(Wireshark 1.12.4 Intel
32.dmg)=947a65b6401a3d628382e6a1d1b757632f2d6b23

patch-wireshark-1.12.3-to-1.12.4.bz2: 338867 bytes
MD5(patch-wireshark-1.12.3-to-1.12.4.bz2)=9482de275f5aec9c7adbdb7627be43b3
SHA1(patch-wireshark-1.12.3-to-1.12.4.bz2)=d720a734e49f41e99148e0eb988aca5a4e0b7f5f
RIPEMD160(patch-wireshark-1.12.3-to-1.12.4.bz2)=74605d9b35a616f50303579ba53348f89bde1476
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlT3VeAACgkQpw8IXSHylJrBVACfaO9JPTt7wLT3VUSVmyxu9DWv
O6IAn2ArO6D17YeSoim8Z8sVvoVypPXK
=uXF1
-----END PGP SIGNATURE-----