Wireshark-dev: [Wireshark-dev] Wireshark 2.0.1 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 29 Dec 2015 14:48:31 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 2.0.1.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2015-31
NBAP dissector crashes. ([2]Bug 11602, [3]Bug 11835, [4]Bug 11841)
* [5]wnpa-sec-2015-37
NLM dissector crash.
* [6]wnpa-sec-2015-39
BER dissector crash.
* [7]wnpa-sec-2015-40
Zlib decompression crash. ([8]Bug 11548)
* [9]wnpa-sec-2015-41
SCTP dissector crash. ([10]Bug 11767)
* [11]wnpa-sec-2015-42
802.11 decryption crash. ([12]Bug 11790, [13]Bug 11826)
* [14]wnpa-sec-2015-43
DIAMETER dissector crash. ([15]Bug 11792)
* [16]wnpa-sec-2015-44
VeriWave file parser crashes. ([17]Bug 11789, [18]Bug 11791)
* [19]wnpa-sec-2015-45
RSVP dissector crash. ([20]Bug 11793)
* [21]wnpa-sec-2015-46
ANSI A & GSM A dissector crashes. ([22]Bug 11797)
* [23]wnpa-sec-2015-47
Ascend file parser crash. ([24]Bug 11794)
* [25]wnpa-sec-2015-48
NBAP dissector crash. ([26]Bug 11815)
* [27]wnpa-sec-2015-49
RSL dissector crash. ([28]Bug 11829)
* [29]wnpa-sec-2015-50
ZigBee ZCL dissector crash. ([30]Bug 11830)
* [31]wnpa-sec-2015-51
Sniffer file parser crash. ([32]Bug 11827)
* [33]wnpa-sec-2015-52
NWP dissector crash. ([34]Bug 11726)
* [35]wnpa-sec-2015-53
BT ATT dissector crash. ([36]Bug 11817)
* [37]wnpa-sec-2015-54
MP2T file parser crash. ([38]Bug 11820)
* [39]wnpa-sec-2015-55
MP2T file parser crash. ([40]Bug 11821)
* [41]wnpa-sec-2015-56
S7COMM dissector crash. ([42]Bug 11823)
* [43]wnpa-sec-2015-57
IPMI dissector crash. ([44]Bug 11831)
* [45]wnpa-sec-2015-58
TDS dissector crash. ([46]Bug 11846)
* [47]wnpa-sec-2015-59
PPI dissector crash. ([48]Bug 11876)
* [49]wnpa-sec-2015-60
MS-WSP dissector crash. ([50]Bug 11931)
The Windows installers are now built using NSIS 2.50 in order to avoid
[51]DLL hijacking flaws.
The following bugs have been fixed:
* Zooming out (Ctrl+-) too far crashes Wireshark. ([52]Bug 8854)
* IPv6 Mobility Header Link-Layer Address Mobility Option is parsed
incorrectly. ([53]Bug 10627)
* About -> Plugins should be a scrollable. ([54]Bug 11427)
* Profile change leaves prior profile residue. ([55]Bug 11493)
* Wireshark crashes when using the VoIP player. ([56]Bug 11596)
* Incorrect presentation of Ascend-Data-Filter (RADIUS attribute
242). ([57]Bug 11630)
* Not possible to stop a capture with invalid filter. ([58]Bug 11667)
* "No interface selected" when having a valid capture filter.
([59]Bug 11671)
* Malformed packet with IPv6 mobility header. ([60]Bug 11728)
* Wireshark crashes dissecting Profinet NRT (DCE-RPC) packet.
([61]Bug 11730)
* All fields in the packet detail pane of a "new packet" window are
expanded by default. ([62]Bug 11731)
* Malformed packets with SET_CUR in the USBVIDEO (UVC) decoding.
([63]Bug 11736)
* Display filters arranges columns incorrectly. ([64]Bug 11737)
* Scrolling and navigating using the trackpad on Mac OS X could be
much better. ([65]Bug 11738)
* Lua Proto() does not validate arguments. ([66]Bug 11739)
* Pointers to deallocated memory when redissecting. ([67]Bug 11740)
* Suggestion for re-phrasing the TCP Window Full message. ([68]Bug
11741)
* Can't parse MPEG-2 Transport Streams generated by the Logik
L26DIGB21 TV. ([69]Bug 11749)
* Qt UI on Windows crashes when changing to next capture file.
([70]Bug 11756)
* First displayed frame not updated when changing profile. ([71]Bug
11757)
* LDAP decode shows invalid number of results for searchResEntry
packets. ([72]Bug 11761)
* Crash when escape to Follow TCP -> Save. ([73]Bug 11763)
* USBPcap prevents mouse and keyboard from working. ([74]Bug 11766)
* Y-axis in RTP graph is in microseconds. ([75]Bug 11784)
* "Delta time displayed" column in Wireshark doesn't work well, but
Wireshark-gtk does. ([76]Bug 11786)
* UDP 12001 SNA Data no longer shown in EBCDIC. ([77]Bug 11787)
* Wireshark Portable is not starting (no messages at all). ([78]Bug
11800)
* IPv6 RPL Routing Header with length of 8 bytes still reads an
address. ([79]Bug 11803)
* g_utf8_validate assertion when reassembling GSM SMS messages
encoded in UCS2. ([80]Bug 11809)
* Calling plugin_if_goto_frame when there is no file loaded causes a
Protection Exception. ([81]Bug 11810)
* Qt UI SIGSEGV before main() in initializer for colors_. ([82]Bug
11833)
* Unable to add a directory to "GeoIP Database Paths". ([83]Bug
11842)
* C++ Run time error when filtering on Expert limit to display
filter. ([84]Bug 11848)
* Widening the window doesn't correctly widen the rightmost column.
([85]Bug 11849)
* SSL V2 Client Hello no longer dissected in Wireshark 2.0. ([86]Bug
11851)
* PacketBB (RFC5444) dissector displays IPv4 addresses incorrectly.
([87]Bug 11852)
* SMTP over port 587 shows identical content for fields "Username"
and "Password" when not decoding base-64-encoded authentication
information. ([88]Bug 11853)
* Converting of EUI64 address to string does not take offset into
account. ([89]Bug 11856)
* CIP segment dissection causes PDML assertion/failure. ([90]Bug
11863)
* In Import from Hex Dump, an attempt to enter the timestamp format
manually crashes the application. ([91]Bug 11873)
* Follow Stream directional selector not readable. ([92]Bug 11887)
* Coloring rule custom colors not saved. ([93]Bug 11888)
* Total number of streams not correct in Follow TCP Stream dialog.
([94]Bug 11889)
* Command line switch -Y for display filter does not work. ([95]Bug
11891)
* Creating Debian package doesn't work. ([96]Bug 11893)
* Visual C++ Runtime Library Error "The application has requested the
Runtime to terminate it in an unusual way." when you do not wait
until Conversations is completely updated before applying "Limit to
display filter". ([97]Bug 11900)
* dpkg-buildpackage relocation R_X86_64_PC32 against symbol. ([98]Bug
11901)
* Bits view in Packet Bytes pane is not persistent. ([99]Bug 11903)
* ICMP Timestamp days, hours, minutes, seconds is incorrect.
([100]Bug 11910)
* MPEG2TS NULL pkt: AFC: "Should be 0 for NULL packets" wrong.
([101]Bug 11921)
New and Updated Features
There are no new features in this release.
New File Format Decoding Support
There are no new file formats in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
6LoWPAN, ANSI A, ASN.1 BER, BT ATT, CIP, CLNP, DIAMETER, DNS, ENIP,
ERF, GSM A, GSM SMS, HiSLIP, ICMP, IEEE 802.11, IEEE 802.11 Radio,
IPMI, IPv4, IPv6, ISUP, L2TP, LDAP, Link (ethertype), MIP6, MP2T,
MS-WSP, NBAP, NWP, PacketBB, PPI, QUIC, RADIUS, RSL, RSVP, S7COMM,
SCSI, SCTP, SMTP, SSL, TCP, TDS, USB, VRT, and ZigBee ZCL
New and Updated Capture File Support
Ascend, ERF, MP2T, Sniffer, and VeriWave
New and Updated Capture Interfaces support
There are no new or updated capture interfaces supported in this
release.
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[102]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [103]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([104]Bug 1419)
The BER dissector might infinitely loop. ([105]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([106]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([107]Bug 2234)
Resolving ([108]Bug 9044) reopens ([109]Bug 3528) so that Wireshark no
longer automatically decodes gzip data when following a TCP stream.
Application crash when changing real-time option. ([110]Bug 4035)
Hex pane display issue after startup. ([111]Bug 4056)
Packet list rows are oversized. ([112]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
([113]Bug 4985)
The 64-bit version of Wireshark will leak memory on Windows when the
display depth is set to 16 bits ([114]Bug 9914)
Wireshark should let you work with multiple capture files. ([115]Bug
10488)
__________________________________________________________________
Getting Help
Community support is available on [116]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [117]the web site.
Official Wireshark training and certification are available from
[118]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [119]Wireshark web site.
__________________________________________________________________
Last updated 2015-12-29 19:26:11 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2015-31.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602
3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11835
4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11841
5. https://www.wireshark.org/security/wnpa-sec-2015-37.html
6. https://www.wireshark.org/security/wnpa-sec-2015-39.html
7. https://www.wireshark.org/security/wnpa-sec-2015-40.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548
9. https://www.wireshark.org/security/wnpa-sec-2015-41.html
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11767
11. https://www.wireshark.org/security/wnpa-sec-2015-42.html
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11826
14. https://www.wireshark.org/security/wnpa-sec-2015-43.html
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792
16. https://www.wireshark.org/security/wnpa-sec-2015-44.html
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11789
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11791
19. https://www.wireshark.org/security/wnpa-sec-2015-45.html
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793
21. https://www.wireshark.org/security/wnpa-sec-2015-46.html
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11797
23. https://www.wireshark.org/security/wnpa-sec-2015-47.html
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794
25. https://www.wireshark.org/security/wnpa-sec-2015-48.html
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11815
27. https://www.wireshark.org/security/wnpa-sec-2015-49.html
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
29. https://www.wireshark.org/security/wnpa-sec-2015-50.html
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830
31. https://www.wireshark.org/security/wnpa-sec-2015-51.html
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11827
33. https://www.wireshark.org/security/wnpa-sec-2015-52.html
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11726
35. https://www.wireshark.org/security/wnpa-sec-2015-53.html
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11817
37. https://www.wireshark.org/security/wnpa-sec-2015-54.html
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11820
39. https://www.wireshark.org/security/wnpa-sec-2015-55.html
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11821
41. https://www.wireshark.org/security/wnpa-sec-2015-56.html
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11823
43. https://www.wireshark.org/security/wnpa-sec-2015-57.html
44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11831
45. https://www.wireshark.org/security/wnpa-sec-2015-58.html
46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11846
47. https://www.wireshark.org/security/wnpa-sec-2015-59.html
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876
49. https://www.wireshark.org/security/wnpa-sec-2015-60.html
50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11931
51. http://nsis.sourceforge.net/Docs/AppendixF.html
52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8854
53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627
54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11427
55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11493
56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11596
57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11630
58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11667
59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11671
60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11728
61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11730
62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11731
63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11736
64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11737
65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11738
66. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11739
67. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11740
68. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11741
69. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11749
70. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11756
71. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11757
72. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11761
73. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11763
74. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11766
75. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11784
76. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11786
77. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11787
78. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11800
79. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11803
80. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11809
81. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11810
82. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11833
83. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11842
84. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11848
85. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11849
86. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11851
87. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11852
88. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11853
89. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11856
90. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11863
91. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11873
92. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11887
93. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11888
94. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11889
95. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11891
96. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11893
97. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11900
98. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11901
99. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11903
100. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11910
101. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11921
102. https://www.wireshark.org/download.html
103. https://www.wireshark.org/download.html#thirdparty
104. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
105. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
106. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
107. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
108. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
109. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
110. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
111. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
112. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
113. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
114. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9914
115. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
116. https://ask.wireshark.org/
117. https://www.wireshark.org/lists/
118. http://www.wiresharktraining.com/
119. https://www.wireshark.org/faq.html
Digests
wireshark-2.0.1.tar.bz2: 31016295 bytes
SHA256(wireshark-2.0.1.tar.bz2)=c9bd07dd0d0045d6ca7537390a1afbcdf33716d193ea7d7084ae4f6c30b683ab
RIPEMD160(wireshark-2.0.1.tar.bz2)=0a83fb6d2c74005840492d0811a4eca29b565602
SHA1(wireshark-2.0.1.tar.bz2)=6703221128305ac33802f0da13d368476ce90688
MD5(wireshark-2.0.1.tar.bz2)=c1610ab2238965363b811e5188750fb1
Wireshark-win64-2.0.1.exe: 47333544 bytes
SHA256(Wireshark-win64-2.0.1.exe)=5c5c9668d0254d183ef94eaaab2ca35e1376ae1bac3f10b21ccf5e14eaafb045
RIPEMD160(Wireshark-win64-2.0.1.exe)=06fc6a95a6a93d4287e4cb4fcbe1f584c8a393d8
SHA1(Wireshark-win64-2.0.1.exe)=27e290b4647adeb51a714d7a831ef88702b518da
MD5(Wireshark-win64-2.0.1.exe)=8a05505aae3807d554a394c8f86ca4ac
Wireshark-win32-2.0.1.exe: 43764688 bytes
SHA256(Wireshark-win32-2.0.1.exe)=03a1d405bdcace6d64d9c743bf544079b4e2eeb1f79c87440c38b5790950beb1
RIPEMD160(Wireshark-win32-2.0.1.exe)=c3f4c13257e4a9a5a637b23e15a90bd0463fce7f
SHA1(Wireshark-win32-2.0.1.exe)=7407cb02091e84f7f329782a5802f1b3b27d9ec9
MD5(Wireshark-win32-2.0.1.exe)=2841bc0a430f1ac575c98f4dce83deb4
WiresharkPortable_2.0.1.paf.exe: 43353168 bytes
SHA256(WiresharkPortable_2.0.1.paf.exe)=66d3b81295bc8860cb766668c4b59e73220d799c52224460422c094d82a78889
RIPEMD160(WiresharkPortable_2.0.1.paf.exe)=c8dddc54f2bdd7a084ca746db67fe1cf4e123cea
SHA1(WiresharkPortable_2.0.1.paf.exe)=8c80e59338aedcb353fa40f028936c336ec478df
MD5(WiresharkPortable_2.0.1.paf.exe)=ec0f68ea58a6242637892c5fb39e8fde
Wireshark 2.0.1 Intel 64.dmg: 31559961 bytes
SHA256(Wireshark 2.0.1 Intel
64.dmg)=8c84d745bb8ab930a8f47fd1e4388300def9afbea90aed449558c8189508b9ea
RIPEMD160(Wireshark 2.0.1 Intel
64.dmg)=be4cb9fbf0f80dd9c17c16ed3a6df6461cd10dd8
SHA1(Wireshark 2.0.1 Intel 64.dmg)=06d300e50cd20bed1b6e13872c390663d717063f
MD5(Wireshark 2.0.1 Intel 64.dmg)=04f046a920113c0136d8d75fdc9870ee
Wireshark 2.0.1 Intel 32.dmg: 32320570 bytes
SHA256(Wireshark 2.0.1 Intel
32.dmg)=244a20142069f238e5f9696af726880df0233b01462ab5028bfff9dd99f81964
RIPEMD160(Wireshark 2.0.1 Intel
32.dmg)=f50e433f16f9417a9c66c4376ab7c298b6b5be9a
SHA1(Wireshark 2.0.1 Intel 32.dmg)=6682044bc8b7c33e7eed8814401bd4a0efb84c48
MD5(Wireshark 2.0.1 Intel 32.dmg)=df7cdee3ef17d81611d1a4dfeca00f4a
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iEYEARECAAYFAlaDDb8ACgkQpw8IXSHylJrnpQCdHlELBj9/8+vquQ7FgDwFNp5C
+58AnijP/UDAZqXtetaYAeP3NyaQwfoj
=hrtV
-----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-dev] UI Proposal for better Analysis for Android devices
- Next by Date: [Wireshark-dev] Wireshark 1.12.9 is now available
- Previous by thread: Re: [Wireshark-dev] UI Proposal for better Analysis for Android devices
- Next by thread: [Wireshark-dev] Wireshark 1.12.9 is now available
- Index(es):