Wireshark-dev: [Wireshark-dev] Wireshark 1.12.13 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 27 Jul 2016 13:17:26 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm proud to announce the release of Wireshark 1.12.13.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
This is the final release of Wireshark 1.12. It officially reaches end
of life on July 31, 2016. If you are still using Wireshark 1.12 you are
encouraged to upgrade to Wireshark 2.0.
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2016-40
NDS dissector crash. ([2]Bug 12576)
* [3]wnpa-sec-2016-41
PacketBB crash. ([4]Bug 12577)
* [5]wnpa-sec-2016-42
WSP infinite loop. ([6]Bug 12594)
* [7]wnpa-sec-2016-43
MMSE infinite loop. ([8]Bug 12624)
* [9]wnpa-sec-2016-44
RLC long loop. ([10]Bug 12660)
* [11]wnpa-sec-2016-45
LDSS dissector crash. ([12]Bug 12662)
* [13]wnpa-sec-2016-46
RLC dissector crash. ([14]Bug 12664)
* [15]wnpa-sec-2016-47
OpenFlow long loop. ([16]Bug 12659)
The following bugs have been fixed:
* T30 FCF byte decoding masks DTC, CIG and NCS. ([17]Bug 1918)
* TShark crashes with option "-z io,stat,..." in the presence of
negative relative packet timestamps. ([18]Bug 9014)
* Packet size limited during capture msg is repeated in the Info
column. ([19]Bug 9826)
* Filter for field name tcp.options.wscale.multiplier cannot exceed
255. ([20]Bug 12525)
* Inconsistent VHT data rate. ([21]Bug 12558)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
802.11 Radiotap, LANforge, LDSS, MMSE, PacketBB, PRP, RLC, RTP MIDI,
T.30, TCP, VITA 49, WiMax RNG-RSP, and WSP
New and Updated Capture File Support
and pcapng
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[22]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [23]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([24]Bug 1419)
The BER dissector might infinitely loop. ([25]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([26]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([27]Bug 2234)
The 64-bit Windows installer does not support Kerberos decryption.
([28]Win64 development page)
Resolving ([29]Bug 9044) reopens ([30]Bug 3528) so that Wireshark no
longer automatically decodes gzip data when following a TCP stream.
Application crash when changing real-time option. ([31]Bug 4035)
Hex pane display issue after startup. ([32]Bug 4056)
Packet list rows are oversized. ([33]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
([34]Bug 4985)
__________________________________________________________________
Getting Help
Community support is available on [35]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [36]the web site.
Official Wireshark training and certification are available from
[37]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [38]Wireshark web site.
__________________________________________________________________
Last updated 2016-07-27 12:29:36 PDT
References
1. https://www.wireshark.org/security/wnpa-sec-2016-40.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12576
3. https://www.wireshark.org/security/wnpa-sec-2016-41.html
4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
5. https://www.wireshark.org/security/wnpa-sec-2016-42.html
6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594
7. https://www.wireshark.org/security/wnpa-sec-2016-43.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
9. https://www.wireshark.org/security/wnpa-sec-2016-44.html
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
11. https://www.wireshark.org/security/wnpa-sec-2016-45.html
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
13. https://www.wireshark.org/security/wnpa-sec-2016-46.html
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
15. https://www.wireshark.org/security/wnpa-sec-2016-47.html
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1918
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9014
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9826
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12525
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12558
22. https://www.wireshark.org/download.html
23. https://www.wireshark.org/download.html#thirdparty
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
28. https://wiki.wireshark.org/Development/Win64
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
35. https://ask.wireshark.org/
36. https://www.wireshark.org/lists/
37. http://www.wiresharktraining.com/
38. https://www.wireshark.org/faq.html
Digests
wireshark-1.12.13.tar.bz2: 29398804 bytes
SHA256(wireshark-1.12.13.tar.bz2)=7836cdaabd056ab4c9dd19cf0c791f11d980d0f6037542476034f2b7bdcf5d5b
RIPEMD160(wireshark-1.12.13.tar.bz2)=45a46794ae375475597866145aa22984b31bedd6
SHA1(wireshark-1.12.13.tar.bz2)=4a036b67ca1ca99c9061cf3d12d0604a62bc8b8c
MD5(wireshark-1.12.13.tar.bz2)=15af85adc8ba83e6e996e13a55df4fb0
Wireshark-win64-1.12.13.exe: 30000016 bytes
SHA256(Wireshark-win64-1.12.13.exe)=31d5420cbf774961eb22f2b0d7cb74dd03a28fae92ded3386cb13fc6fd579053
RIPEMD160(Wireshark-win64-1.12.13.exe)=3b98d010ad2750654fd8bbae24d76ad7387c940d
SHA1(Wireshark-win64-1.12.13.exe)=1d8eedea8a177016a644ee3fd8a0adaa326c6109
MD5(Wireshark-win64-1.12.13.exe)=39f05a5c5ebd3b183c74e986fb0e30ca
Wireshark-win32-1.12.13.exe: 23765136 bytes
SHA256(Wireshark-win32-1.12.13.exe)=47eb5c4ac48848fdfd5c322491e0320c998f5a2dccebad88af9ed787c1907039
RIPEMD160(Wireshark-win32-1.12.13.exe)=444c5898a58a2c6a90b3f62f146b4e17da945031
SHA1(Wireshark-win32-1.12.13.exe)=f65a13b356136c0a4f39ca94dd8c5393af465df7
MD5(Wireshark-win32-1.12.13.exe)=52853c0ebe373d4a04a5d15134e7e859
WiresharkPortable-1.12.13.paf.exe: 30073440 bytes
SHA256(WiresharkPortable-1.12.13.paf.exe)=689a470fa5e1d922954eea0ba1bd235180c2b8d92b66c3a643e24b4a4cf7605a
RIPEMD160(WiresharkPortable-1.12.13.paf.exe)=60ca4071f1445b9e0c4ae606d23bfe677c621f31
SHA1(WiresharkPortable-1.12.13.paf.exe)=9d0c3011e91e5b269a59592b2cb43899f03a8f4e
MD5(WiresharkPortable-1.12.13.paf.exe)=4d973537801770f10d21cda1e64b8ecb
Wireshark 1.12.13 Intel 32.dmg: 21958686 bytes
SHA256(Wireshark 1.12.13 Intel
32.dmg)=a6e1772b10da9de19bbbb7d1ac3f486606cfad9cdaa58e091a6b0fafabcda411
RIPEMD160(Wireshark 1.12.13 Intel
32.dmg)=4f00e1ff7ee85d10fdb280157524fa6b158306bb
SHA1(Wireshark 1.12.13 Intel 32.dmg)=95157d7a8eecfcf3e7155addd590863585db1039
MD5(Wireshark 1.12.13 Intel 32.dmg)=67b90605a9ac64c6b09e7c3fe9bf6747
Wireshark 1.12.13 Intel 64.dmg: 26539534 bytes
SHA256(Wireshark 1.12.13 Intel
64.dmg)=a26b87ca9f5ac3b4c84250d460f379ddbe85647809d96eae297a9f7810c38dd3
RIPEMD160(Wireshark 1.12.13 Intel
64.dmg)=bf6402fc9a5336ec8b62ae38bddfbdcfd9b3556f
SHA1(Wireshark 1.12.13 Intel 64.dmg)=d3f9a716e2344ccf6b921b00225b19dc54d9d224
MD5(Wireshark 1.12.13 Intel 64.dmg)=90e2d7c60c48de31caba57e66e427469
patch-wireshark-1.12.12-to-1.12.13.bz2: 93835 bytes
SHA256(patch-wireshark-1.12.12-to-1.12.13.bz2)=a714c205a39b78994dff5dcbac58e1a0ab59877dbd7dee2c3fe5ab221a412d53
RIPEMD160(patch-wireshark-1.12.12-to-1.12.13.bz2)=39bd18cdcea8a8e3ab4c118a50ccf69119ce5f19
SHA1(patch-wireshark-1.12.12-to-1.12.13.bz2)=81b24071262451a716049223c9d876fdf2495f58
MD5(patch-wireshark-1.12.12-to-1.12.13.bz2)=6ee788e18e5746551b3b95c0ed07db32
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=t1dd
-----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-dev] Wireshark 2.0.5 is now available
- Next by Date: [Wireshark-dev] Question on payload reassembly
- Previous by thread: [Wireshark-dev] Wireshark 2.0.5 is now available
- Next by thread: [Wireshark-dev] Question on payload reassembly
- Index(es):