Wireshark-users: [Wireshark-users] Wireshark 2.0.12 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 12 Apr 2017 15:05:23 -0700
I'm proud to announce the release of Wireshark 2.0.12.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2017-04 RTMTP dissector infinite loop ([2]Bug 13347)
       [3]CVE-2017-6472
     * [4]wnpa-sec-2017-12
       IMAP dissector crash ([5]Bug 13466) [6]CVE-2017-7703
     * [7]wnpa-sec-2017-13
       WBMXL dissector infinite loop ([8]Bug 13477) [9]CVE-2017-7702
     * [10]wnpa-sec-2017-14
       NetScaler file parser infinite loop ([11]Bug 13478)
       [12]CVE-2017-7700
     * [13]wnpa-sec-2017-15
       RPCoRDMA dissector infinite loop ([14]Bug 13558) [15]CVE-2017-7705
     * [16]wnpa-sec-2017-16
       BGP dissector infinite loop ([17]Bug 13557) [18]CVE-2017-7701
     * [19]wnpa-sec-2017-18
       PacketBB dissector crash ([20]Bug 13559)
     * [21]wnpa-sec-2017-19
       SLSK dissector long loop ([22]Bug 13576)
     * [23]wnpa-sec-2017-20
       SIGCOMP dissector infinite loop ([24]Bug 13578)
     * [25]wnpa-sec-2017-21
       WSP dissector infinite loop ([26]Bug 13581)

   The following bugs have been fixed:
     * T30 FCF byte decoding masks DTC, CIG and NCS. ([27]Bug 1918)
     * Wireshark gives decoding error during rnsap message dissection(SCCP
       reassembly). ([28]Bug 3360)
     * Payload in 2 SCCP DT1 messages in the same frame isn't
       (sub)dissected. ([29]Bug 11130)
     * Qt UI: Wireshark crash when deleting IO graph string while it's in
       editing mode. ([30]Bug 13234)
     * Crash on exit due to an invalid frame data sequence state. ([31]Bug
       13433)
     * Some bytes ignored in every packet in NetScaler packet trace when
       vmnames are included in packet headers. ([32]Bug 13459)
     * Lua dissector: ProtoField int&42; do not allow FT_HEX or FT_OCT,
       crash when set to FT_HEX_DEC or FT_DEC_HEX. ([33]Bug 13484)
     * GIOP LocateRequest v1.0 is improperly indicated as "malformed".
       ([34]Bug 13488)
     * Bug in ZigBee - Zone Status Change Notification. ([35]Bug 13493)
     * Packet exception in packet-ua3g and incomplete strings in
       packet-noe. ([36]Bug 13502)
     * Wrong BGP capability dissect. ([37]Bug 13521)
     * Endpoint statistics column labels seem incorrect. ([38]Bug 13526)
     * When a Lua enum or bool preference is changed via context menu,
       prefs_changed isn't called with Qt Wireshark. ([39]Bug 13536)
     * tshark's -z endpoints,ip ignores optional filter. ([40]Bug 13538)
     * libfuzzer: PEEKREMOTE dissector bug. ([41]Bug 13544)
     * libfuzzer: packetBB dissector bug (packetbb.msg.addr.valuecustom).
       ([42]Bug 13545)
     * libfuzzer: WSP dissector bug (wsp.header.x_wap_tod). ([43]Bug
       13546)
     * libfuzzer: MIH dissector bug. ([44]Bug 13547)
     * libfuzzer: DNS dissector bug. ([45]Bug 13548)
     * libfuzzer: WLCCP dissector bug. ([46]Bug 13549)
     * libfuzzer: TAPA dissector bug. ([47]Bug 13553)
     * libfuzzer: lapsat dissector bug. ([48]Bug 13554)
     * libfuzzer: wassp dissector bug. ([49]Bug 13555)
     * SSH Dissector uses incorrect length for protocol field
       (ssh.protocol). ([50]Bug 13574)
     * NBAP malformed packet for short Binding ID. ([51]Bug 13577)
     * libfuzzer: WSP dissector bug (wsp.header.x_up_1.x_up_proxy_tod).
       ([52]Bug 13579)
     * RTPproxy dissector adds multi lines to info column. ([53]Bug 13582)
     * libfuzzer: asterix dissector bug (asterix.021_230_RA). ([54]Bug
       13580)

  New and Updated Features

   There are no new features in this release.

  New File Format Decoding Support

   There are no new file formats in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ASTERIX, BGP, BT AVRCP, DNS, EAPOL-MKA, GIOP, ICMP, IEEE 802.15.4,
   IMAP, ISIS LSP, iSNS, LAPSat, MIH, MySQL, NBAP, PacketBB, PEEKREMOTE,
   RPCoRDMA, RTMTP, RTPproxy, SCCP, SIGCOMP, SLSK, SSH, T.30, TAPA, UA3G,
   WASSP, WBXML, WLCCP, WSP, and ZigBee ZCL IAS

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

   NetScaler

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [55]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [56]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([57]Bug 1419)

   The BER dissector might infinitely loop. ([58]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([59]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([60]Bug 2234)

   Application crash when changing real-time option. ([61]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([62]Bug 4985)

   Wireshark should let you work with multiple capture files. ([63]Bug
   10488)

   Dell Backup and Recovery (DBAR) makes many Windows applications crash,
   including Wireshark. ([64]Bug 12036)
     __________________________________________________________________

Getting Help

   Community support is available on [65]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [66]the web site.

   Official Wireshark training and certification are available from
   [67]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [68]Wireshark web site.
     __________________________________________________________________

   Last updated 2017-04-12 19:40:57 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2017-04.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6472
   4. https://www.wireshark.org/security/wnpa-sec-2017-12.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7703
   7. https://www.wireshark.org/security/wnpa-sec-2017-13.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
   9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7702
  10. https://www.wireshark.org/security/wnpa-sec-2017-14.html
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
  12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7700
  13. https://www.wireshark.org/security/wnpa-sec-2017-15.html
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
  15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7705
  16. https://www.wireshark.org/security/wnpa-sec-2017-16.html
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
  18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7701
  19. https://www.wireshark.org/security/wnpa-sec-2017-18.html
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13559
  21. https://www.wireshark.org/security/wnpa-sec-2017-19.html
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13576
  23. https://www.wireshark.org/security/wnpa-sec-2017-20.html
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13578
  25. https://www.wireshark.org/security/wnpa-sec-2017-21.html
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13581
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1918
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3360
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11130
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13234
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13433
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13459
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13484
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13488
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13493
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13502
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13521
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13526
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13536
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13538
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13544
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13545
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13546
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13547
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13548
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13549
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13553
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13554
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13555
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13574
  51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13577
  52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13579
  53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13582
  54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13580
  55. https://www.wireshark.org/download.html
  56. https://www.wireshark.org/download.html#thirdparty
  57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  65. https://ask.wireshark.org/
  66. https://www.wireshark.org/lists/
  67. http://www.wiresharktraining.com/
  68. https://www.wireshark.org/faq.html


Digests

wireshark-2.0.12.tar.bz2: 31239318 bytes
SHA256(wireshark-2.0.12.tar.bz2)=77301794445712088d283c1a9f4dfd6da835227ed4921bf68255b8c16ffef2d1
RIPEMD160(wireshark-2.0.12.tar.bz2)=94506c7b0711b02cd156226d22d1c826178aa8dc
SHA1(wireshark-2.0.12.tar.bz2)=c996e40e0c5e52ccfa148d7b82f72d9ea615d9c0
MD5(wireshark-2.0.12.tar.bz2)=fc19863d2b50fededd5cf120f5d9803a

Wireshark-win32-2.0.12.exe: 44165176 bytes
SHA256(Wireshark-win32-2.0.12.exe)=455a84e45441220d6c2b3085c9c130f3c5ce2aebd73f23d3487c337d412def25
RIPEMD160(Wireshark-win32-2.0.12.exe)=ca10bb49336fe8c01d59b9b1e85fa17896482441
SHA1(Wireshark-win32-2.0.12.exe)=b8a8e321b0b2101a5f2587205c83dc90d28b1460
MD5(Wireshark-win32-2.0.12.exe)=7f56ec2fbfa185826f9b0b1615c329c5

Wireshark-win64-2.0.12.exe: 47787120 bytes
SHA256(Wireshark-win64-2.0.12.exe)=c924eb9d3edefcc0d63eba28326eafd649be6c38962608c42c5b854fe10a20a5
RIPEMD160(Wireshark-win64-2.0.12.exe)=4fdfbb1fa835e80288ec7f1205ffe7dd9c4923e1
SHA1(Wireshark-win64-2.0.12.exe)=9c7c227ce1e988b39985f594b1cc0d6be0ba0bf7
MD5(Wireshark-win64-2.0.12.exe)=c019195e62395b491f094aa2762a2117

WiresharkPortable_2.0.12.paf.exe: 43849680 bytes
SHA256(WiresharkPortable_2.0.12.paf.exe)=03d32527ea198826ba8fece3ea3f8ef9a3e2816dfb3832f67cc7cadb44e9094f
RIPEMD160(WiresharkPortable_2.0.12.paf.exe)=24b3dbb5c702ff283d49218a1ae6ebaae6961e2f
SHA1(WiresharkPortable_2.0.12.paf.exe)=1891982152deef9437a35b178fd5b8735ef973cd
MD5(WiresharkPortable_2.0.12.paf.exe)=a7439b2742580c4b4bcb1f20a742ece3

Wireshark 2.0.12 Intel 64.dmg: 31767009 bytes
SHA256(Wireshark 2.0.12 Intel
64.dmg)=7777c248884435d18cfe5c442d1a82040e08538e86e2b01a78796ee0524891c4
RIPEMD160(Wireshark 2.0.12 Intel
64.dmg)=4159093b9e6b24975f844c0588b1546990b4b457
SHA1(Wireshark 2.0.12 Intel 64.dmg)=aaabf6feb05a5cb5df8ef32cb2266f4eb6a4c8c5
MD5(Wireshark 2.0.12 Intel 64.dmg)=6fd0355179867c1a8391e2c1e2812249

Wireshark 2.0.12 Intel 32.dmg: 32520773 bytes
SHA256(Wireshark 2.0.12 Intel
32.dmg)=3a69829e5ea7ec31bb26262aa4546e85459371c728ecc5432d049355c0c4f465
RIPEMD160(Wireshark 2.0.12 Intel
32.dmg)=2327187c541c1f9c2ad35e612c9af61133c788a8
SHA1(Wireshark 2.0.12 Intel 32.dmg)=efb373f13092567848f4202e666b6f510b0bc0e5
MD5(Wireshark 2.0.12 Intel 32.dmg)=a1d200dcc5acfdd52e715a8388364843

Attachment: signature.asc
Description: OpenPGP digital signature