Wireshark-dev: [Wireshark-dev] Wireshark 1.10.10 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 16 Sep 2014 12:43:07 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 1.10.10.
__________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol
analyzer. It is used for troubleshooting, analysis, development
and education.
__________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed.
* [1]wnpa-sec-2014-12
RTP dissector crash. ([2]Bug 9920) [3]CVE-2014-6421
[4]CVE-2014-6422
* [5]wnpa-sec-2014-13
MEGACO dissector infinite loop. ([6]Bug 10333)
[7]CVE-2014-6423
* [8]wnpa-sec-2014-14
Netflow dissector crash. ([9]Bug 10370) [10]CVE-2014-6424
* [11]wnpa-sec-2014-17
RTSP dissector crash. ([12]Bug 10381) [13]CVE-2014-6427
* [14]wnpa-sec-2014-18
SES dissector crash. ([15]Bug 10454) [16]CVE-2014-6428
* [17]wnpa-sec-2014-19
Sniffer file parser crash. ([18]Bug 10461)
[19]CVE-2014-6429 [20]CVE-2014-6430 [21]CVE-2014-6431
[22]CVE-2014-6432
The following bugs have been fixed:
* Wireshark can crash during remote capture (rpcap)
configuration. ([23]Bug 3554, [24]Bug 6922,
ws-buglink:7021)
* MIPv6 Service Selection Identifier parse error. ([25]Bug
10323)
* 802.11 BA sequence number decode is broken. ([26]Bug 10334)
* TRILL NLPID 0xc0 unknown to Wireshark. ([27]Bug 10382)
* Wrong decoding of RPKI RTR End of Data PDU. ([28]Bug 10411)
* Misparsed NTP control assignments with empty values.
([29]Bug 10417)
* 6LoWPAN multicast address decompression problems. ([30]Bug
10426)
* GUI Hangs when Selecting Path to GeoIP Files. ([31]Bug
10434)
* 6LoWPAN context handling not working. ([32]Bug 10443)
* SIP: When export to a CSV, Info is changed to differ.
([33]Bug 10453)
* Typo in packet-netflow.c. ([34]Bug 10458)
* UCP dissector bug of operation 30 - data not decoded.
([35]Bug 10464)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
6LoWPAN, DVB-CI, IEEE 802.11, MEGACO, MIPv6, Netflow, NTP, OSI,
RPKI RTR, RTP, RTSP, SES, SIP, and UCP
New and Updated Capture File Support
DOS Sniffer, and NetScaler
__________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available
from [36]http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark
packages. You can usually install or upgrade Wireshark using
the package management system specific to that platform. A list
of third-party packages can be found on the [37]download page
on the Wireshark web site.
__________________________________________________________
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About->Folders to find the default locations on your system.
__________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([38]Bug
1419)
The BER dissector might infinitely loop. ([39]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([40]Bug 1814)
Filtering tshark captures with read filters (-R) no longer
works. ([41]Bug 2234)
The 64-bit Windows installer does not support Kerberos
decryption. ([42]Win64 development page)
Resolving ([43]Bug 9044) reopens ([44]Bug 3528) so that
Wireshark no longer automatically decodes gzip data when
following a TCP stream.
Application crash when changing real-time option. ([45]Bug
4035)
Hex pane display issue after startup. ([46]Bug 4056)
Packet list rows are oversized. ([47]Bug 4357)
Summary pane selected frame highlighting not maintained.
([48]Bug 4445)
Wireshark and TShark will display incorrect delta times in some
cases. ([49]Bug 4985)
__________________________________________________________
Getting Help
Community support is available on [50]Wireshark's Q&A site and
on the wireshark-users mailing list. Subscription information
and archives for all of Wireshark's mailing lists can be found
on [51]the web site.
Official Wireshark training and certification are available
from [52]Wireshark University.
__________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [53]Wireshark web site.
__________________________________________________________
Last updated 2014-09-16 09:08:31 PDT
References
1. https://www.wireshark.org/security/wnpa-sec-2014-12.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421
4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422
5. https://www.wireshark.org/security/wnpa-sec-2014-13.html
6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10333
7. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423
8. https://www.wireshark.org/security/wnpa-sec-2014-14.html
9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10370
10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424
11. https://www.wireshark.org/security/wnpa-sec-2014-17.html
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381
13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427
14. https://www.wireshark.org/security/wnpa-sec-2014-18.html
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10454
16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428
17. https://www.wireshark.org/security/wnpa-sec-2014-19.html
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429
20. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430
21. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431
22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3554
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6922
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10323
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10334
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10382
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10411
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10417
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10426
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10434
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10443
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10453
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10458
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10464
36. http://www.wireshark.org/download.html
37. http://www.wireshark.org/download.html#thirdparty
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
42. https://wiki.wireshark.org/Development/Win64
43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
50. http://ask.wireshark.org/
51. http://www.wireshark.org/lists/
52. http://www.wiresharktraining.com/
53. http://www.wireshark.org/faq.html
Digests
wireshark-1.10.10.tar.bz2: 26823919 bytes
MD5(wireshark-1.10.10.tar.bz2)=1458cedf1b67a36db4555e6469a179e1
SHA1(wireshark-1.10.10.tar.bz2)=bcad35318e0a2428caf7e44d6c33a79ec9c1bdd6
RIPEMD160(wireshark-1.10.10.tar.bz2)=f8ace3bad8736246c6342200d199d143bbbcebac
Wireshark-win32-1.10.10.exe: 22177056 bytes
MD5(Wireshark-win32-1.10.10.exe)=cb160b6be686602993b66ca2b1b2b1da
SHA1(Wireshark-win32-1.10.10.exe)=8db0db187186a496ce71127b0c2eeed20ae14423
RIPEMD160(Wireshark-win32-1.10.10.exe)=6ff8c12f8da4ad92542cc83e2d3257f80637b4a0
Wireshark-win64-1.10.10.exe: 28023688 bytes
MD5(Wireshark-win64-1.10.10.exe)=f73c60486b789e7e3c7edede59cc4ecf
SHA1(Wireshark-win64-1.10.10.exe)=83ecf6f426d08b80664a8fa95bf9c681df70e38a
RIPEMD160(Wireshark-win64-1.10.10.exe)=49181a0a9447110bba1229dacd91e18a27fc14ea
Wireshark-1.10.10.u3p: 30662795 bytes
MD5(Wireshark-1.10.10.u3p)=871172cc6ab38da8f2d397198b4dfb19
SHA1(Wireshark-1.10.10.u3p)=1780de9260aeed43e28264716c48558ece5d6f24
RIPEMD160(Wireshark-1.10.10.u3p)=ddeb6193b953dce454c4ffa92469bf38397b1fc5
WiresharkPortable-1.10.10.paf.exe: 23540840 bytes
MD5(WiresharkPortable-1.10.10.paf.exe)=3985cb6904095f125856b665b5b72417
SHA1(WiresharkPortable-1.10.10.paf.exe)=a79f1e508ff3d36c1372dff669e881ccb2508008
RIPEMD160(WiresharkPortable-1.10.10.paf.exe)=18d9f033e6e88876576ddffb2a4a92c5de54fe4b
Wireshark 1.10.10 Intel 32.dmg: 20474898 bytes
MD5(Wireshark 1.10.10 Intel 32.dmg)=24d3b766a25795afe6b68dadd4c7d36b
SHA1(Wireshark 1.10.10 Intel
32.dmg)=6cde849afc8cc15f9b2e25ab62bf9c03a18fcbb8
RIPEMD160(Wireshark 1.10.10 Intel
32.dmg)=91d29372156af5bde64723eaa23ff0614659b499
Wireshark 1.10.10 Intel 64.dmg: 24805922 bytes
MD5(Wireshark 1.10.10 Intel 64.dmg)=6b1d50f0851e4d47a07314bab3879b0c
SHA1(Wireshark 1.10.10 Intel
64.dmg)=ef6e179e004a17ca0c1e2110d3c4fcc6de0cbe28
RIPEMD160(Wireshark 1.10.10 Intel
64.dmg)=db500717cfc36fc892f0dc881433facefaabd204
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
iEYEARECAAYFAlQYkssACgkQpw8IXSHylJr24wCgkk1Up/VbcP/eJLZ/0VLiqGcO
7WIAnjeeWBcT7vIJM8tgreAm8+cysxZg
=vioZ
-----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-dev] Wireshark 1.12.1 is now available
- Next by Date: Re: [Wireshark-dev] Question about capturing from multiple interfaces that have the same MAC Address
- Previous by thread: [Wireshark-dev] Wireshark 1.12.1 is now available
- Next by thread: [Wireshark-dev] Dissector for "PCEP Extensions for Stateful PCE"
- Index(es):