Wireshark-dev: [Wireshark-dev] Wireshark 2.4.9 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 29 Aug 2018 12:04:44 -0700
I'm proud to announce the release of Wireshark 2.4.9.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2018-44
Bluetooth AVDTP dissector crash. [2]Bug 14884. [3]CVE-2018-16058.
* [4]wnpa-sec-2018-45
Bluetooth Attribute Protocol dissector crash. [5]Bug 14994.
[6]CVE-2018-16056.
* [7]wnpa-sec-2018-46
Radiotap dissector crash. [8]Bug 15022. [9]CVE-2018-16057.
The following bugs have been fixed:
* Incorrect presentation of dissected data item (NETMASK) in ISAKMP
dissector. [10]Bug 14987.
* udpdump frame too long error. [11]Bug 14989.
* ASTERIX Category 062 / 135 Altitude has wrong value. [12]Bug 15030.
* Wireshark cannot decrypt SSL/TLS session if it was proxied over
HTTP tunnel. [13]Bug 15042.
* TLS records in a HTTP tunnel are displayed as "Encrypted Handshake
Message". [14]Bug 15043.
* BTATT Dissector: Temperature Measurement: Celsius and Fahrenheit
swapped. [15]Bug 15058.
* Diameter AVP User Location Info, Mobile Network Code decoded not
correctly. [16]Bug 15068.
* Heartbeat message "Info" displayed without comma separator. [17]Bug
15079.
* DTAP CC Start DTMF keypad information parsing error. [18]Bug 15088.
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
ASTERIX, Bluetooth ATT, Bluetooth AVDTP, DHCP, DTLS, E.212, HTTP,
ISAKMP, K12, Nordic BLE, Radiotap, and SSL
New and Updated Capture File Support
pcapng
New and Updated Capture Interfaces support
ciscodump udpdump
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[19]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [20]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([21]Bug 1419)
The BER dissector might infinitely loop. ([22]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([23]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([24]Bug 2234)
Application crash when changing real-time option. ([25]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
([26]Bug 4985)
Wireshark should let you work with multiple capture files. ([27]Bug
10488)
__________________________________________________________________
Getting Help
Community support is available on [28]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [29]the web site.
Official Wireshark training and certification are available from
[30]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [31]Wireshark web site.
__________________________________________________________________
Last updated 2018-08-29 16:51:51 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2018-44.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058
4. https://www.wireshark.org/security/wnpa-sec-2018-45.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056
7. https://www.wireshark.org/security/wnpa-sec-2018-46.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14987
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14989
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15030
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15042
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15043
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15058
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15068
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15079
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15088
19. https://www.wireshark.org/download.html
20. https://www.wireshark.org/download.html#thirdparty
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
28. https://ask.wireshark.org/
29. https://www.wireshark.org/lists/
30. http://www.wiresharktraining.com/
31. https://www.wireshark.org/faq.html
Digests
wireshark-2.4.9.tar.xz: 29094756 bytes
SHA256(wireshark-2.4.9.tar.xz)=63c4f24665269536f0e2ec321d394336fef6ba12466241a0e2433e936ac633e3
RIPEMD160(wireshark-2.4.9.tar.xz)=410212dcbcac97dd9942f947ad34419779ee3e1d
SHA1(wireshark-2.4.9.tar.xz)=631db6203d21ca5512b8bf6b9239e48d6b492b53
Wireshark-win32-2.4.9.exe: 52756664 bytes
SHA256(Wireshark-win32-2.4.9.exe)=15b60c8cda9ec0812c64160f4813ef681d4adcf6fae4dd251634c02875f813fd
RIPEMD160(Wireshark-win32-2.4.9.exe)=a8581d13814e43e5d245325f3d2cafb566697df9
SHA1(Wireshark-win32-2.4.9.exe)=97a50913671ef8a2c5d9be835ca42b4bb0ee5025
Wireshark-win64-2.4.9.exe: 57971840 bytes
SHA256(Wireshark-win64-2.4.9.exe)=05d6631a9a9bcaeea117ae39be2578b7faf2d5d3b22d85c9cfb93c09fa9e4aa3
RIPEMD160(Wireshark-win64-2.4.9.exe)=7e62a320384af7724883f29778687fbed39de249
SHA1(Wireshark-win64-2.4.9.exe)=b344d04cff80f7a4546e83b690092fb18a2ae963
Wireshark-win32-2.4.9.msi: 42008576 bytes
SHA256(Wireshark-win32-2.4.9.msi)=ce3ee23968b5bb6985a3e0b04ea17ea4d0eeec4cb97c4d24eb06073281d36c17
RIPEMD160(Wireshark-win32-2.4.9.msi)=bf24cea6f0525f5c2b9503655039bddb51c584b7
SHA1(Wireshark-win32-2.4.9.msi)=57c79bcb5d39b8d30c88f34dfba7dbb53455983f
Wireshark-win64-2.4.9.msi: 47075328 bytes
SHA256(Wireshark-win64-2.4.9.msi)=79529af55a04940e6e8c93324189ba1c47c7bae900ff730e4d182179bcebd043
RIPEMD160(Wireshark-win64-2.4.9.msi)=e49919ca51a168789bef6d6fc42144956db3089c
SHA1(Wireshark-win64-2.4.9.msi)=8489b8a3e192bebec3f0da98d10937c48dc8de59
WiresharkPortable_2.4.9.paf.exe: 45431688 bytes
SHA256(WiresharkPortable_2.4.9.paf.exe)=ed5e185adb6a1265b6ca536cea755494e52770a89c33c615286cb66e8720d9e8
RIPEMD160(WiresharkPortable_2.4.9.paf.exe)=7631187b5126f0bdf0372e652b4dbe329b96ed91
SHA1(WiresharkPortable_2.4.9.paf.exe)=117e3e28b07888f6b87a486f86c50d01b1bd3801
Wireshark 2.4.9 Intel 64.dmg: 42532464 bytes
SHA256(Wireshark 2.4.9 Intel
64.dmg)=52869e0ab8e85a949512c334c622f5250248623630a89b4dd70298fd3bf92a65
RIPEMD160(Wireshark 2.4.9 Intel
64.dmg)=6f52debc382057cbbf076c3b77bea82a49fd690b
SHA1(Wireshark 2.4.9 Intel 64.dmg)=fb4177f8b015d7482b33eea88f908f0f64f96caa
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-dev] Petri-Dish stuck?
- Next by Date: [Wireshark-dev] Wireshark 2.2.17 is now available
- Previous by thread: [Wireshark-dev] Petri-Dish stuck?
- Next by thread: [Wireshark-dev] Wireshark 2.2.17 is now available
- Index(es):