Wireshark-users: [Wireshark-users] Wireshark 2.0.13 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 1 Jun 2017 13:45:04 -0700
I'm proud to announce the release of Wireshark 2.0.13.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2017-22
       Bazaar dissector infinite loop ([2]Bug 13599) [3]CVE-2017-9352
     * [4]wnpa-sec-2017-24
       DHCP dissector read overflow ([5]Bug 13609, [6]Bug 13628)
       [7]CVE-2017-9351
     * [8]wnpa-sec-2017-25
       SoulSeek dissector infinite loop ([9]Bug 13631) [10]CVE-2017-9346
     * [11]wnpa-sec-2017-26
       DNS dissector infinite loop ([12]Bug 13633) [13]CVE-2017-9345
     * [14]wnpa-sec-2017-27
       DICOM dissector infinite loop ([15]Bug 13685) [16]CVE-2017-9349
     * [17]wnpa-sec-2017-28
       openSAFETY dissector memory exhaustion ([18]Bug 13649)
       [19]CVE-2017-9350
     * [20]wnpa-sec-2017-29
       BT L2CAP dissector divide by zero ([21]Bug 13701) [22]CVE-2017-9344

     * [23]wnpa-sec-2017-30
       MSNIP dissector crash ([24]Bug 13725) [25]CVE-2017-9343

     * [26]wnpa-sec-2017-32
       RGMP dissector crash ([27]Bug 13646) [28]CVE-2017-9354

   The following bugs have been fixed:
     * DICOM dissection error. ([29]Bug 13164)
     * Can not export captured DICOM objects in version 2.2.5. ([30]Bug
       13570)
     * LibFuzzer: ISUP dissector bug (isup.number_different_meaning).
       ([31]Bug 13588)
     * Dissector Bug, protocol BT ATT. ([32]Bug 13590)
     * [oss-fuzz] UBSAN: shift exponent 105 is too large for 32-bit type
       int in packet-ositp.c:551:79. ([33]Bug 13606)
     * [oss-fuzz] UBSAN: shift exponent -77 is negative in
       packet-netflow.c:7717:23. ([34]Bug 13607)
     * [oss-fuzz] UBSAN: shift exponent 1959 is too large for 32-bit type
       int in packet-sigcomp.c:2128:28. ([35]Bug 13610)
     * [oss-fuzz] UBSAN: shift exponent 63 is too large for 32-bit type
       guint32 (aka unsigned int) in packet-rtcp.c:917:24. ([36]Bug 13611)
     * [oss-fuzz] UBSAN: shift exponent 70 is too large for 64-bit type
       guint64 (aka unsigned long) in dwarf.c:42:43. ([37]Bug 13616)
     * [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type
       int in packet-xot.c:260:23. ([38]Bug 13618)
     * [oss-fuzz] UBSAN: shift exponent -5 is negative in
       packet-sigcomp.c:1722:36. ([39]Bug 13619)
     * [oss-fuzz] UBSAN: index 2049 out of bounds for type char [2049] in
       packet-quakeworld.c:134:5. ([40]Bug 13624)
     * [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type
       int in packet-netsync.c:467:25. ([41]Bug 13639)
     * [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type
       int in packet-sigcomp.c:3857:24. ([42]Bug 13641)
     * [oss-fuzz] ASAN: stack-use-after-return
       epan/dissectors/packet-ieee80211.c:14341:23 in add_tagged_field.
       ([43]Bug 13662)
     * Welcome screen invalid capture filter wihtout WinPcap installed
       causes runtime error. ([44]Bug 13672)
     * SMB protocol parser does not parse SMB_COM_TRANSACTION2_SECONDARY
       (0x33) command correctly. ([45]Bug 13690)

  New and Updated Features

   There are no new features in this release.

  New File Format Decoding Support

   There are no new file formats in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   Bazaar, BT ATT, BT L2CAP, DHCP, DICOM, DNS, DWARF, IEEE 802.11, ISUP,
   MSNIP, Netflow, Netsync, openSAFETY, OSITP, QUAKEWORLD, RGMP, RTCP,
   SIGCOMP, SMB, SoulSeek, and XOT

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [46]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [47]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([48]Bug 1419)

   The BER dissector might infinitely loop. ([49]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([50]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([51]Bug 2234)

   Application crash when changing real-time option. ([52]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([53]Bug 4985)

   Wireshark should let you work with multiple capture files. ([54]Bug
   10488)

   Dell Backup and Recovery (DBAR) makes many Windows applications crash,
   including Wireshark. ([55]Bug 12036)
     __________________________________________________________________

Getting Help

   Community support is available on [56]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [57]the web site.

   Official Wireshark training and certification are available from
   [58]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [59]Wireshark web site.
     __________________________________________________________________

   Last updated 2017-06-01 18:24:28 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2017-22.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9352
   4. https://www.wireshark.org/security/wnpa-sec-2017-24.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
   7. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9351
   8. https://www.wireshark.org/security/wnpa-sec-2017-25.html
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
  10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9346
  11. https://www.wireshark.org/security/wnpa-sec-2017-26.html
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
  13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9345
  14. https://www.wireshark.org/security/wnpa-sec-2017-27.html
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
  16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9349
  17. https://www.wireshark.org/security/wnpa-sec-2017-28.html
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
  19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350
  20. https://www.wireshark.org/security/wnpa-sec-2017-29.html
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
  22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9344
  23. https://www.wireshark.org/security/wnpa-sec-2017-30.html
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
  25. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9343
  26. https://www.wireshark.org/security/wnpa-sec-2017-32.html
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
  28. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9354
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13164
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13570
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13588
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13590
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13606
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13607
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13610
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13611
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13616
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13618
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13619
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13639
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13641
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13662
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13672
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13690
  46. https://www.wireshark.org/download.html
  47. https://www.wireshark.org/download.html#thirdparty
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  56. https://ask.wireshark.org/
  57. https://www.wireshark.org/lists/
  58. http://www.wiresharktraining.com/
  59. https://www.wireshark.org/faq.html


Digests

wireshark-2.0.13.tar.bz2: 31268594 bytes
SHA256(wireshark-2.0.13.tar.bz2)=6bb8398edb7b59e7265b763aba54610c3f362af8a0ecfe6d4c9e51069687e243
RIPEMD160(wireshark-2.0.13.tar.bz2)=94de44a3cb997f421b31c2568bf291d5de44e155
SHA1(wireshark-2.0.13.tar.bz2)=ea0d3170570f1d4b2a70965e255b05675255be7a
MD5(wireshark-2.0.13.tar.bz2)=664328bf4f606a334168d1f3a9801b24

Wireshark-win32-2.0.13.exe: 44183496 bytes
SHA256(Wireshark-win32-2.0.13.exe)=64738da8fe5316ef2b90af7bb7821a2e05bc190baf99304c42f109b2e9405db8
RIPEMD160(Wireshark-win32-2.0.13.exe)=a056f7ae22768339d7a9d49f1c15bb5177bf3d15
SHA1(Wireshark-win32-2.0.13.exe)=5018bcba4a8442068468dbec354ecfb0e93e4246
MD5(Wireshark-win32-2.0.13.exe)=e9e6ba5d248d4521148504aba3ca3e42

Wireshark-win64-2.0.13.exe: 47804584 bytes
SHA256(Wireshark-win64-2.0.13.exe)=6968c556c2fc9c20bcec164407e85d84fe1804935bb3825bfcd1cfde93c4a010
RIPEMD160(Wireshark-win64-2.0.13.exe)=b0b756c854dc8e8f7a884afe0a22ad1315c887bc
SHA1(Wireshark-win64-2.0.13.exe)=973f46f5df7d87ee549b07f436f67be163ef324d
MD5(Wireshark-win64-2.0.13.exe)=a66dee5fdab4eb87bbded7c78589dde6

WiresharkPortable_2.0.13.paf.exe: 43864080 bytes
SHA256(WiresharkPortable_2.0.13.paf.exe)=6a3d42ee913ac1387f8e9266277d16899d238e0122deb1d4d78be6e19f6accea
RIPEMD160(WiresharkPortable_2.0.13.paf.exe)=41c286edd3a9f93f0fe46c50d8546c652926bb3e
SHA1(WiresharkPortable_2.0.13.paf.exe)=af613a62e5a6a1d3e02732df967f972013532794
MD5(WiresharkPortable_2.0.13.paf.exe)=32fd0935cd4a5deb4e59a58e2ab96694

Wireshark 2.0.13 Intel 64.dmg: 31777078 bytes
SHA256(Wireshark 2.0.13 Intel
64.dmg)=4e64c19dbeb6b649accc7e491574d441bd78be8e2e3c59bfb8dd75c1d26c94cf
RIPEMD160(Wireshark 2.0.13 Intel
64.dmg)=da9abed98e1af300500061e0ca854393262966e7
SHA1(Wireshark 2.0.13 Intel 64.dmg)=11867078cb5fe3eb65971fa3ca9ed7c53b36768c
MD5(Wireshark 2.0.13 Intel 64.dmg)=6c3ee6afa2b559af49148e370ea5df8f

Wireshark 2.0.13 Intel 32.dmg: 32527499 bytes
SHA256(Wireshark 2.0.13 Intel
32.dmg)=2f89e0903a50adba76f120629006df8db0cc5caac8a8f2f94cce0e957db1548d
RIPEMD160(Wireshark 2.0.13 Intel
32.dmg)=1d17d8e303a0a0704cedbdea5f0661a91aa9d14f
SHA1(Wireshark 2.0.13 Intel 32.dmg)=deeed00d9558d48922624210a6bb0e8675b499b7
MD5(Wireshark 2.0.13 Intel 32.dmg)=bc1dc1462e3825d7984ce10747f1e6ec

Attachment: signature.asc
Description: OpenPGP digital signature