Wireshark-users: [Wireshark-users] Wireshark 1.8.12 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 17 Dec 2013 11:47:42 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.8.12.

     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2013-66
       The SIP dissector could go into an infinite loop.
       Discovered by Alain Botti. ([2]Bug 9388)
       Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
       [3]CVE-2013-7112
     * [4]wnpa-sec-2013-68
       The NTLMSSP v2 dissector could crash. Discovered by Garming
       Sam. ([5]Bug 9488)
       Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
       [6]CVE-2013-7114

   The following bugs have been fixed:
     * "On-the-wire" packet lengths are limited to 65535 bytes.
       ([7]Bug 8808, ws-buglink:9390)
     * Crash when selecting "Decode As" based on SCTP PPID.
       ([8]Bug 8976)
     * Wireshark fails to decode single-line, multiple Contact:
       URIs in SIP responses. ([9]Bug 9031)
     * gsm_map doesn't decode MAPv3 reportSM-DeliveryStatus
       result. ([10]Bug 9382)
     * DTLS: fix buffer overflow in mac check. ([11]Bug 9512)
     * Correct data length in SCSI_DATA_IN packets (within iSCSI).
       ([12]Bug 9521)
     * Fix "decode as ..." for packet-time.c. ([13]Bug 9563)
     * GSM SMS UDH EMS control expects 4 octets instead of 3 with
       OPTIONAL 4th. ([14]Bug 9550)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   DTLS, DVB-BAT, DVB-CI, GSM MAP, GSM SMS, iSCSI, SCTP, SIP, and
   Time

  New and Updated Capture File Support

   Pcap-ng.

  Getting Wireshark

   Wireshark source code and installation packages are available
   from [15]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [16]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([17]Bug
   1419)

   The BER dissector might infinitely loop. ([18]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([19]Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. ([20]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([21]Win64 development page)

   Application crash when changing real-time option. ([22]Bug
   4035)

   Hex pane display issue after startup. ([23]Bug 4056)

   Packet list rows are oversized. ([24]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([25]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([26]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [27]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [28]the web site.

   Official Wireshark training and certification are available
   from [29]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [30]Wireshark web site.
     __________________________________________________________

   Last updated 2013-12-17 09:22:53 PST

References

   1. https://www.wireshark.org/security/wnpa-sec-2013-66.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9388
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
   4. https://www.wireshark.org/security/wnpa-sec-2013-68.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8976
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9382
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9512
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9521
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9563
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9550
  15. http://www.wireshark.org/download.html
  16. http://www.wireshark.org/download.html#thirdparty
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  21. https://wiki.wireshark.org/Development/Win64
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  27. http://ask.wireshark.org/
  28. http://www.wireshark.org/lists/
  29. http://www.wiresharktraining.com/
  30. http://www.wireshark.org/faq.html


Digests

wireshark-1.8.12.tar.bz2: 24132271 bytes
MD5(wireshark-1.8.12.tar.bz2)=64a979ded9197899aed6953a8d7759b0
SHA1(wireshark-1.8.12.tar.bz2)=737acadc9d14a02e19275c512d31675844cbc559
RIPEMD160(wireshark-1.8.12.tar.bz2)=f7b38247e29825d125deb316218b56184221762f

Wireshark-win64-1.8.12.exe: 26413104 bytes
MD5(Wireshark-win64-1.8.12.exe)=d27ef78ca6211145a979853b0b2eb5f4
SHA1(Wireshark-win64-1.8.12.exe)=a0ddb928eff06f8c6f610097673e40f8d2770922
RIPEMD160(Wireshark-win64-1.8.12.exe)=0e6ba1d81f7d44e76782b9ea6345504d5fdb9842

Wireshark-win32-1.8.12.exe: 20752936 bytes
MD5(Wireshark-win32-1.8.12.exe)=d16e3e084a5afc677cc30341727b056c
SHA1(Wireshark-win32-1.8.12.exe)=e8378596adbac60d3086afda462529bc597a3a75
RIPEMD160(Wireshark-win32-1.8.12.exe)=8f2af3d47062c5ce93909197f7f040f2d1ef841d

Wireshark-1.8.12.u3p: 28443112 bytes
MD5(Wireshark-1.8.12.u3p)=9939236a4cba82a204282a1ecd28e9fa
SHA1(Wireshark-1.8.12.u3p)=9918d81e69d41b4d51006df0f6f02c7ae01a5fda
RIPEMD160(Wireshark-1.8.12.u3p)=4a7aa29abc74f501d8cd5204cf64012b1134c785

WiresharkPortable-1.8.12.paf.exe: 21936144 bytes
MD5(WiresharkPortable-1.8.12.paf.exe)=81cbf1eaa676764dd80cb1ecb61602d9
SHA1(WiresharkPortable-1.8.12.paf.exe)=ee5c07e2c116289371f762ed22faf13d92cf2e89
RIPEMD160(WiresharkPortable-1.8.12.paf.exe)=3450fd30b2f3f230fd8068210e92e16212370ca7

Wireshark 1.8.12 PPC 32.dmg: 22772335 bytes
MD5(Wireshark 1.8.12 PPC 32.dmg)=dd98f786aeb25ba58f0ec1239af12f5f
SHA1(Wireshark 1.8.12 PPC 32.dmg)=f8813c0e6fbe236bc47cedbc2d72fe277b052920
RIPEMD160(Wireshark 1.8.12 PPC
32.dmg)=a4bfeac2a32ee4ad6de9ff2594064c0d4b263ddf

Wireshark 1.8.12 Intel 64.dmg: 21810474 bytes
MD5(Wireshark 1.8.12 Intel 64.dmg)=8b072ca52b45fd95ba496d709ae42f7e
SHA1(Wireshark 1.8.12 Intel
64.dmg)=fa782ae7f1b03f46a0ed6e7e99fdd71ca10cbf4d
RIPEMD160(Wireshark 1.8.12 Intel
64.dmg)=61b2c2965d33204dcec5c6385ccb19b020ee7723

Wireshark 1.8.12 Intel 32.dmg: 18308507 bytes
MD5(Wireshark 1.8.12 Intel 32.dmg)=67e8e5ed7599193c129ed42044f2c542
SHA1(Wireshark 1.8.12 Intel
32.dmg)=41840996681af498308978b6bac505d0f67ac893
RIPEMD160(Wireshark 1.8.12 Intel
32.dmg)=5a3c3d609e38f3165b38149389cb23e7c4be197b

patch-wireshark-1.8.11-to-1.8.12.diff.bz2: 72700 bytes
MD5(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=d6106886a1890d9768e608703c9616e5
SHA1(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=0814434c278f4342efe3e68219383a80035319ea
RIPEMD160(patch-wireshark-1.8.11-to-1.8.12.diff.bz2)=9e3d729409d30b054fc56530f3d8f27012a82dca
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlKwql4ACgkQpw8IXSHylJplZwCfXfGJ7S9O5weu3TAQgatIrBGK
SekAn3q35tDVtlrPnDc8l1GlPcCzGxkn
=+lM7
-----END PGP SIGNATURE-----