Wireshark-dev: [Wireshark-dev] Wireshark 2.0.4 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 7 Jun 2016 13:58:01 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm proud to announce the release of Wireshark 2.0.4.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2016-29
The SPOOLS dissector could go into an infinite loop. Discovered by
the CESG.
* [2]wnpa-sec-2016-30
The IEEE 802.11 dissector could crash. ([3]Bug 11585)
* [4]wnpa-sec-2016-31
The IEEE 802.11 dissector could crash. Discovered by Mateusz
Jurczyk. ([5]Bug 12175)
* [6]wnpa-sec-2016-32
The UMTS FP dissector could crash. ([7]Bug 12191)
* [8]wnpa-sec-2016-33
Some USB dissectors could crash. Discovered by Mateusz Jurczyk.
([9]Bug 12356)
* [10]wnpa-sec-2016-34
The Toshiba file parser could crash. Discovered by iDefense Labs.
([11]Bug 12394)
* [12]wnpa-sec-2016-35
The CoSine file parser could crash. Discovered by iDefense Labs.
([13]Bug 12395)
* [14]wnpa-sec-2016-36
The NetScreen file parser could crash. Discovered by iDefense Labs.
([15]Bug 12396)
* [16]wnpa-sec-2016-37
The Ethernet dissector could crash. ([17]Bug 12440)
The following bugs have been fixed:
* Saving pcap capture file with ERF encapsulation creates an invalid
pcap file. ([18]Bug 3606)
* Questionable calling of Ethernet dissector by encapsulating
protocol dissectors. ([19]Bug 9933)
* Wireshark 1.12.0 does not dissect HTTP correctly. ([20]Bug 10335)
* Don't copy details of hidden columns. ([21]Bug 11788)
* RTP audio player crashes. ([22]Bug 12166)
* Crash when saving RTP audio Telephony->RTP->RTP
Streams->Analyze->Save->Audio. ([23]Bug 12211)
* Edit - preferences - add column field not showing dropdown for
choices. ([24]Bug 12321)
* Using _ws.expert in a filter can cause a crash. ([25]Bug 12335)
* Crash in SCCP dissector UAT (Qt UI only). ([26]Bug 12364)
* J1939 frame without data = malformed packet ? ([27]Bug 12366)
* The stream number in tshark's "-z follow,tcp,<stream number>"
option is 0-origin rather than 1-origin. ([28]Bug 12383)
* IP Header Length display filter should show calculated value.
([29]Bug 12387)
* Multiple file radio buttons should be check boxes. ([30]Bug 12388)
* Wrong check for getaddrinfo and gethostbyname on Solaris 11.
([31]Bug 12391)
* ICMPv6 dissector doesn't respect actual packet length. ([32]Bug
12400)
* Format DIS header timestamp mm:ss.nnnnnn. ([33]Bug 12402)
* RTP Stream Analysis can no longer be sorted in 2.0.3. ([34]Bug
12405)
* RTP Stream Analysis fails to complete in 2.0.3 when packets are
sliced. ([35]Bug 12406)
* Network-Layer Name Resolution uses first 32-bits of IPv6 DNS
address as IPv4 address in some circumstances. ([36]Bug 12412)
* BACnet decoder incorrectly flags a valid APDU as a "Malformed
Packet". ([37]Bug 12422)
* Valid ISUP messages marked with warnings. ([38]Bug 12423)
* Profile command line switch "-C" not working in Qt interface.
([39]Bug 12425)
* MRCPv2: info column not showing info correctly. ([40]Bug 12426)
* Diameter: Experimental result code 5142. ([41]Bug 12428)
* Tshark crashes when analyzing RTP due to pointer being freed not
allocated. ([42]Bug 12430)
* NFS: missing information in getattr for supported exclusive create
attributes. ([43]Bug 12435)
* Ethernet type field with a value of 9100 is shown as "Unknown".
([44]Bug 12441)
* Documentation does not include support for Windows Server 2012 R2.
([45]Bug 12455)
* Column preferences ruined too easily. ([46]Bug 12465)
* SMB Open andX extended response decoded incorrectly. ([47]Bug
12472)
* SMB NtCreate andX with extended response sometimes incorrect.
([48]Bug 12473)
* Viewing NFSv3 Data, checking SRTs doesn't work. ([49]Bug 12478)
* Make wireshark with Qt enabled buildable on ARM. ([50]Bug 12483)
Windows installers and PortableApps® packages are dual signed using
SHA-1 and SHA-256 in order to comply with [51]Microsoft Authenticode
policy. Windows 7 and Windows Server 2008 R2 users should ensure that
[52]update 3123479 is installed. Windows Vista and Windows Server 2008
users should ensure that [53]hotfix 2763674 is installed.
New and Updated Features
There are no new features in this release.
New File Format Decoding Support
There are no new file formats in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
AFS, ANSI IS-637 A, BACapp, BT BNEP, Cisco FabricPath MiM, CSN.1,
DCERPC SPOOLS, DIS, Ethernet, GSM A RR, ICMPv6, IEEE 802.11, IPv4,
ISUP, J1939, JXTA, LAPSat, LPADm, LTE-RRC, MRCPv2, NFS, OpenFlow,
SGsAP, SMB, STT, TZSP, UMTS FP, and USB
New and Updated Capture File Support
Aethra, Catapult DCT2000, CoSine, DBS Etherwatch, ERF, iSeries, Ixia
IxVeriWave, NetScreen, Toshiba, and VMS TCPIPtrace
New and Updated Capture Interfaces support
There are no new or updated capture interfaces supported in this
release.
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[54]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [55]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([56]Bug 1419)
The BER dissector might infinitely loop. ([57]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([58]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([59]Bug 2234)
Resolving ([60]Bug 9044) reopens ([61]Bug 3528) so that Wireshark no
longer automatically decodes gzip data when following a TCP stream.
Application crash when changing real-time option. ([62]Bug 4035)
Hex pane display issue after startup. ([63]Bug 4056)
Packet list rows are oversized. ([64]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
([65]Bug 4985)
The 64-bit version of Wireshark will leak memory on Windows when the
display depth is set to 16 bits ([66]Bug 9914)
Wireshark should let you work with multiple capture files. ([67]Bug
10488)
Dell Backup and Recovery (DBAR) makes many Windows applications crash,
including Wireshark. ([68]Bug 12036)
__________________________________________________________________
Getting Help
Community support is available on [69]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [70]the web site.
Official Wireshark training and certification are available from
[71]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [72]Wireshark web site.
__________________________________________________________________
Last updated 2016-06-07 20:37:09 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2016-29.html
2. https://www.wireshark.org/security/wnpa-sec-2016-30.html
3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
4. https://www.wireshark.org/security/wnpa-sec-2016-31.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12175
6. https://www.wireshark.org/security/wnpa-sec-2016-32.html
7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
8. https://www.wireshark.org/security/wnpa-sec-2016-33.html
9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
10. https://www.wireshark.org/security/wnpa-sec-2016-34.html
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
12. https://www.wireshark.org/security/wnpa-sec-2016-35.html
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
14. https://www.wireshark.org/security/wnpa-sec-2016-36.html
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
16. https://www.wireshark.org/security/wnpa-sec-2016-37.html
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12440
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3606
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9933
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10335
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11788
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12166
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12211
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12321
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12335
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12364
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12366
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12383
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12387
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12388
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12391
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12400
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12402
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12405
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12406
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12412
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12422
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12423
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12425
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12426
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12428
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12430
43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12435
44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12441
45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12455
46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12465
47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12472
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12473
49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12478
50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12483
51.
http://social.technet.microsoft.com/wiki/contents/articles/32288.windows-enforcement-of-authenticode-code-signing-and-timestamping.aspx
52. https://support.microsoft.com/en-us/kb/3123479
53. https://support.microsoft.com/en-us/kb/2763674
54. https://www.wireshark.org/download.html
55. https://www.wireshark.org/download.html#thirdparty
56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
66. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9914
67. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
68. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
69. https://ask.wireshark.org/
70. https://www.wireshark.org/lists/
71. http://www.wiresharktraining.com/
72. https://www.wireshark.org/faq.html
Digests
wireshark-2.0.4.tar.bz2: 31121258 bytes
SHA256(wireshark-2.0.4.tar.bz2)=9ea9c82da9942194ebc8fc5c951a02e6d179afa7472cb6d96ca76154510de1a5
RIPEMD160(wireshark-2.0.4.tar.bz2)=c767f062c421e15cde8f1d83c8fcd7c2c2a138eb
SHA1(wireshark-2.0.4.tar.bz2)=9d76a28ba4f7566bef1aefbb2868e1ddcb93e999
MD5(wireshark-2.0.4.tar.bz2)=622928dc6cb31c227c672ec3ec697f28
Wireshark-win64-2.0.4.exe: 47578216 bytes
SHA256(Wireshark-win64-2.0.4.exe)=3306b9b52e251f0f989eb78a19b298eeced6ebab85e9e167aeaeb1453728bde9
RIPEMD160(Wireshark-win64-2.0.4.exe)=a52f51b9d84b745635aab2cf885e3f4f3b131628
SHA1(Wireshark-win64-2.0.4.exe)=13983ad5b244e9db8154888d5f25ad850deb8a6c
MD5(Wireshark-win64-2.0.4.exe)=7b686baf4404271132219a505c936a4a
Wireshark-win32-2.0.4.exe: 43987120 bytes
SHA256(Wireshark-win32-2.0.4.exe)=9f4b818affdb7cda21128d46774afc85e6bdd82e09597c84940bd1451df3d259
RIPEMD160(Wireshark-win32-2.0.4.exe)=a385411e6a1caf2acb306cfef5a7bfac6b2e8391
SHA1(Wireshark-win32-2.0.4.exe)=4cd730a25b58dc2f289a8d1ca5d684d8b81664d9
MD5(Wireshark-win32-2.0.4.exe)=cf652ea77d3cbf30d8d866f30215052d
WiresharkPortable_2.0.4.paf.exe: 43671848 bytes
SHA256(WiresharkPortable_2.0.4.paf.exe)=9586b49faf201643115769d3c72fb0c8ee6c7a791797ffa3570adbd5cbf4d6a9
RIPEMD160(WiresharkPortable_2.0.4.paf.exe)=14645af3d30dd69f2ee946136129f3404a94e22b
SHA1(WiresharkPortable_2.0.4.paf.exe)=046ddbae023c9691f00586cfe89184290e5fcc9e
MD5(WiresharkPortable_2.0.4.paf.exe)=ad5726e4e7450e7ddb3e0d293d32a21d
Wireshark 2.0.4 Intel 64.dmg: 31689834 bytes
SHA256(Wireshark 2.0.4 Intel
64.dmg)=b78531be77099f4d4b08a1a0fea6dbb777b739ee82255cc83f7de47137ef1627
RIPEMD160(Wireshark 2.0.4 Intel
64.dmg)=3079f32fcf95a99560b9d26d63d9a9d6ac758645
SHA1(Wireshark 2.0.4 Intel 64.dmg)=0f48d5dd644f56544a145a1195763e5ca22b9b8b
MD5(Wireshark 2.0.4 Intel 64.dmg)=3671126b80029b798f0270766cb3f687
Wireshark 2.0.4 Intel 32.dmg: 32415649 bytes
SHA256(Wireshark 2.0.4 Intel
32.dmg)=52dd39ab2c200d80a3eeeabd8d4c41a109815280f2c51db080c104b3075f4ecd
RIPEMD160(Wireshark 2.0.4 Intel
32.dmg)=db425b89d92ab0759eb4d6f626b8ba948d9565db
SHA1(Wireshark 2.0.4 Intel 32.dmg)=a75793af4e8fb7d0cd6196e5288f05a5eff10861
MD5(Wireshark 2.0.4 Intel 32.dmg)=880f31ca32bda60cb6459d0d87522275
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQIcBAEBCgAGBQJXVzVZAAoJEIIkSnjm/q7qkPcP/0/NAKYJ6wjXjUcKc+j0jqc1
+KIpmrn80W5K8n8W1d9cglcrjp4N1sVywz7e3IYGA4+flLm9e2WK6byIJxLKb/fc
vDdCnrZ6o1DtgBGyyZRRXFPHnW1CNxyQomWUhMKPSHoSEWWT4C0bH0j0U5CoZ5jX
26Ap2WZPSQ+8Qq2pePwXLE9f3i6soQHi0G3moUI5uv1ZaLn8/5fyQ05f4MxzPU4n
ByJhuSAeI3miCQUkXyu1zlrl2kHEn8OZbttYn5/W6qI2OQYX+xIXKLuXjmJNEZUf
ACHQ6BTd1InGoh1Sl8pWD0fYRyqLfXO1W2elDl39i0sTcm/QaDJFuU4r0OhB+G/9
t1NJ5OVQsCH2wcX8O3McjEVLAQ3wYPR9BUtqkhkhRMQ0NQXPUguEFyM9ek4NUPYx
a/aayksmqm1xnlRTSZqvSDazEuaR93CwOLFF9v5qilPCmSxZj0g+EIVphCAVyTOi
BO0pBJUamAirh5pnDcXl9gLUTK5OBtO9u/GZ+uFzGlZI9eDNM3rlQEBMDj2ubi1m
aHg8jqhmL+5QcjeEH6jO874D4ZN5ybhplGNRQiM4F9Xfdfw895ARsr/w8ap2TaRp
kATrnfP9pFhyJnz3gOhSlpWJz+43yH15AWajSxpnGtN+drMv+bQ6Pb6h4+UzOFe+
V67BFtrDmDgpQYaJgG92
=+pkT
-----END PGP SIGNATURE-----
- Prev by Date: Re: [Wireshark-dev] Use Npcap as the default Windows capture library for Wireshark
- Next by Date: [Wireshark-dev] Wireshark 1.12.12 is now available
- Previous by thread: Re: [Wireshark-dev] Sign extension bug in proto_tree_set_uint64?
- Next by thread: [Wireshark-dev] Wireshark 1.12.12 is now available
- Index(es):