Wireshark-dev: [Wireshark-dev] Wireshark 1.6.3 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 01 Nov 2011 12:44:23 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.6.3. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. o wnpa-sec-2011-17 The CSN.1 dissector could crash. (Bug 6351) Versions affected: 1.6.0 to 1.6.2. o wnpa-sec-2011-18 Huzaifa Sidhpurwala of Red Hat Security Response Team discovered that the Infiniband dissector could dereference a NULL pointer. (Bug 6476) Versions affected: 1.4.0 to 1.4.9, 1.6.0 to 1.6.2. o wnpa-sec-2011-19 Huzaifa Sidhpurwala of Red Hat Security Response Team discovered a buffer overflow in the ERF file reader. (Bug 6479) Versions affected: 1.4.0 to 1.4.9, 1.6.0 to 1.6.2. The following bugs have been fixed: o Assertion failed when doing File->Quit->Save during live capture. (Bug 1710) o Wrong PCEP XRO sub-object decoding. (Bug 3778) o Wireshark window takes very long time to show up if invalid network file path is at recent file list (Bug 3810) o Decoding [Status Records] Timestamp Sequence Field in Bundle Protocol fails if over 32 bits. (Bug 4109) o ISUP party number dissection. (Bug 5221) o wireshark-1.4.2 crashes when testing the example python dissector because of a dissector count assertion. (Bug 5431) o Ethernet packets with both VLAN tag and LLC header no longer displayed correctly. (Bug 5645) o SLL encapsuled 802.1Q VLAN is not dissected. (Bug 5680) o Wireshark crashes when attempting to open a file via drag & drop when there's already a file open. (Bug 5987) o Adding and removing custom HTTP headers requires a restart. (Bug 6241) o Can't read full 64-bit SNMP values. (Bug 6295) o Dissection fails for frames with Gigamon Header and VLAN. (Bug 6305) o RTP Stream Analysis does not work for TURN-encapsulated RTP. (Bug 6322) o packet-csn1.c doesn't process CSN_CHOICE entries properly. (Bug 6328) o BACnet property time-synchronization-interval (204) name shown incorrectly as time-synchronization-recipients. (Bug 6336) o GUI crash on invalid IEEE 802.11 GAS frame. (Bug 6345) o [ASN.1 PER] Incorrect decoding of BIT STRING type. (Bug 6347) o ICMPv6 router advertisement Prefix Information Flag R "Router Address" missing. (Bug 6350) o Export -> Object -> HTTP -> save all: Error on saving files. (Bug 6362) o Inner tag of 802.1ad frames not parsed properly. (Bug 6366) o Added cursor type decoding to MySQL dissector. (Bug 6396) o Incorrect identification of UDP-encapsulated NAT-keepalive packets. (Bug 6414) o WPA IE pairwise cipher suite dissector uses incorrect value_string list. (Bug 6420) o S1AP protocol can't decode IPv6 transportLayerAddress. (Bug 6435) o RTPS2 dissector doesn't handle 0 in the octestToNextHeader field. (Bug 6449) o packet-ajp13 fix, cleanup, and enhancement. (Bug 6452) o Network Instruments Observer file format bugs. (Bug 6453) o Wireshark crashes when using "Open Recent" 2 times in a row. (Bug 6457) o Wireshark packet_gsm-sms, display bug: Filler bits in TP-User Data Header. (Bug 6469) o wireshark unable to decode NetFlow options which have system scope size != 4 bytes. (Bug 6471) o Display filter Expression Dialog Box Error. (Bug 6472) o text_import_scanner.l missing. (Bug 6531) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support AJP13, ASN.1 PER, BACnet, CSN.1, DTN, Ethernet, ICMPv6, IEEE 802.11, IEEE 802.1q, Infiniband, IPsec, MySQL, PCEP, PN-RT, RTP, S1AP, SSL New and Updated Capture File Support Endace ERF. Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with libsmi. (Win64 development page) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985 and bug 5580) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Training is available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.6.3.tar.bz2: 21468737 bytes MD5(wireshark-1.6.3.tar.bz2) = 5012 c75c 379f fd47 fbcf 395d 9a6e 417e SHA1(wireshark-1.6.3.tar.bz2) = de73 a101 1a9e dfa9 a1df be2d 05e3 2fbd 702a 0cab RIPEMD160(wireshark-1.6.3.tar.bz2) = 96f2 21a2 fc47 c4bb 2974 08a0 1e8d 9f8b 0a59 fc3b wireshark-win32-1.6.3.exe: 19572375 bytes MD5(wireshark-win32-1.6.3.exe) = 22eb 6b17 ee32 4ab9 9f7c f645 1333 08eb SHA1(wireshark-win32-1.6.3.exe) = 03b5 093f f4d2 3be8 794e 216b 6469 f65b 35ff 65d7 RIPEMD160(wireshark-win32-1.6.3.exe) = 810b c79b 393d 1a8c 43cf deb4 2007 1bd5 4a26 c0cc wireshark-win64-1.6.3.exe: 22751981 bytes MD5(wireshark-win64-1.6.3.exe) = cee7 5f51 12f3 b8b7 1efb 5029 2646 d609 SHA1(wireshark-win64-1.6.3.exe) = 6a68 82db 0f83 2ee3 6d39 b1d2 fb6f c2c0 ffdf 1919 RIPEMD160(wireshark-win64-1.6.3.exe) = e02e 15d2 42fa 1f1c 83e0 a00a a60c ad99 73a1 49a6 wireshark-1.6.3.u3p: 26070268 bytes MD5(wireshark-1.6.3.u3p) = 9e2e ba9e bef8 d77c bc0b 2848 6ab3 5d1a SHA1(wireshark-1.6.3.u3p) = bc52 8649 875b d6ed 5349 4e02 78e5 0d09 5035 f8fd RIPEMD160(wireshark-1.6.3.u3p) = 1bf2 1e36 2de1 5794 3e76 70d8 4524 2090 ae5d 78f2 WiresharkPortable-1.6.3.paf.exe: 20472953 bytes MD5(WiresharkPortable-1.6.3.paf.exe) = 8bd7 039e 93d5 b218 7e06 2c3d 9ade 97c5 SHA1(WiresharkPortable-1.6.3.paf.exe) = d419 58fa 061d 3baa 1f0f e1b2 4a4a c9b0 0381 a302 RIPEMD160(WiresharkPortable-1.6.3.paf.exe) = 34bc 5cfa f809 0952 9553 2841 a752 fe2f aec4 54d9 Wireshark 1.6.3 Intel 32.dmg: 20476340 bytes MD5(Wireshark 1.6.3 Intel 32.dmg) = c62b cbab 205d 67ad 569e 2bde 7748 dafb SHA1(Wireshark 1.6.3 Intel 32.dmg) = 0d48 9517 d4a0 075e 479f c300 2a42 9fc0 3db2 0f5e RIPEMD160(Wireshark 1.6.3 Intel 32.dmg) = f54d 08fd e5db 987a 6e8f 6adb a736 64d5 9807 671a Wireshark 1.6.3 Intel 64.dmg: 20279544 bytes MD5(Wireshark 1.6.3 Intel 64.dmg) = 76f8 6955 4ad1 a63a 127c 71a2 592a 9a59 SHA1(Wireshark 1.6.3 Intel 64.dmg) = 0038 662f 09de 69f3 1f66 bc9f 7726 87c0 68f4 74bc RIPEMD160(Wireshark 1.6.3 Intel 64.dmg) = 6e96 d2de 28c7 f974 c2e8 7f5f af24 d987 1495 44fe Wireshark 1.6.3 PPC 32.dmg: 21164310 bytes MD5(Wireshark 1.6.3 PPC 32.dmg) = 030f 9bc4 f229 03f5 7e06 b628 d555 1831 SHA1(Wireshark 1.6.3 PPC 32.dmg) = d571 c152 fd53 82d9 b33d fc50 c719 9207 4d2b ed52 RIPEMD160(Wireshark 1.6.3 PPC 32.dmg) = d055 1119 af24 4197 b248 884d c24b d3b0 55c0 024e patch-wireshark-1.6.2-to-1.6.3.diff.bz2: 608958 bytes MD5(patch-wireshark-1.6.2-to-1.6.3.diff.bz2) = 2c84 22a8 7eac 49bf 41c7 2cdd 93de 371c SHA1(patch-wireshark-1.6.2-to-1.6.3.diff.bz2) = 1408 5aba 2a2e b332 656c 3ec3 14f1 887b e945 5e79 RIPEMD160(patch-wireshark-1.6.2-to-1.6.3.diff.bz2) = a19e 9d1c d0c8 a896 2c65 4910 1a84 7eb3 e062 bd89 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk6wTBcACgkQpw8IXSHylJqnhgCfXqMy+iBO5fE0PyxHrglnL1Yb QbsAoLebLcAi6LqfQXQXLXgNZbas1eek =UKqG -----END PGP SIGNATURE-----
- Prev by Date: Re: [Wireshark-dev] Looking for h248/asn1 packet traces
- Next by Date: [Wireshark-dev] Wireshark 1.4.10 is now available
- Previous by thread: Re: [Wireshark-dev] Looking for h248/asn1 packet traces
- Next by thread: [Wireshark-dev] Wireshark 1.4.10 is now available
- Index(es):