Wireshark-users: [Wireshark-users] Wireshark 2.4.11 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 28 Nov 2018 12:39:05 -0800
I'm proud to announce the release of Wireshark 2.4.11.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2018-51 The Wireshark dissection engine could crash.
[2]Bug 14466. [3]CVE-2018-19625.
* [4]wnpa-sec-2018-52 The DCOM dissector could crash. [5]Bug 15130.
[6]CVE-2018-19626.
* [7]wnpa-sec-2018-53 The LBMPDM dissector could crash. [8]Bug 15132.
[9]CVE-2018-19623.
* [10]wnpa-sec-2018-54 The MMSE dissector could go into an infinite
loop. [11]Bug 15250. [12]CVE-2018-19622.
* [13]wnpa-sec-2018-55 The IxVeriWave file parser could crash.
[14]Bug 15279. [15]CVE-2018-19627.
* [16]wnpa-sec-2018-56 The PVFS dissector could crash. [17]Bug 15280.
[18]CVE-2018-19624.
The following bugs have been fixed:
* VoIP Calls dialog doesn't include RTP stream when preparing a
filter. [19]Bug 13440.
* Wireshark installs on macOS with permissions for
/Library/Application Support/Wireshark that are too restrictive.
[20]Bug 14335.
* Closing Enabled Protocols dialog crashes wireshark. [21]Bug 14349.
* Encrypted Alerts corresponds to a wrong selection in the packet
bytes pane. [22]Bug 14712.
* MATE unable to extract fields for PDU. [23]Bug 15208.
* Malformed Packet: SV. [24]Bug 15224.
* ISUP (ANSI) packets malformed in WS versions later than 2.4.8.
[25]Bug 15236.
* Handover candidate enquire message not decoded. [26]Bug 15237.
* MLE security suite display incorrect. [27]Bug 15288.
* Message for incorrect IPv4 option lengths is incorrect. [28]Bug
15290.
* TACACS+ dissector does not properly reassemble large accounting
messages. [29]Bug 15293.
* NLRI of S-PMSI A-D BGP route not being displayed. [30]Bug 15307.
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
BGP, DCOM, GSM A BSSMAP, IEEE 802.11 Radiotap, ISUP, LBMPDM, LISP, MLE,
MMSE, PVFS, SLL, SSL/TLS, SV, and TACACS+
New and Updated Capture File Support
3GPP TS 32.423 Trace, and IxVeriWave
New and Updated Capture Interfaces support
There are no new or updated capture interfaces supported in this
release.
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[31]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [32]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([33]Bug 1419)
The BER dissector might infinitely loop. ([34]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([35]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([36]Bug 2234)
Application crash when changing real-time option. ([37]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
([38]Bug 4985)
Wireshark should let you work with multiple capture files. ([39]Bug
10488)
__________________________________________________________________
Getting Help
Community support is available on [40]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [41]the web site.
Official Wireshark training and certification are available from
[42]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [43]Wireshark web site.
__________________________________________________________________
Last updated 2018-11-28 18:14:29 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2018-51.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625
4. https://www.wireshark.org/security/wnpa-sec-2018-52.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626
7. https://www.wireshark.org/security/wnpa-sec-2018-53.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623
10. https://www.wireshark.org/security/wnpa-sec-2018-54.html
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622
13. https://www.wireshark.org/security/wnpa-sec-2018-55.html
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627
16. https://www.wireshark.org/security/wnpa-sec-2018-56.html
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13440
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14335
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14349
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14712
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15208
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15224
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15236
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15237
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15288
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15290
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15293
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15307
31. https://www.wireshark.org/download.html
32. https://www.wireshark.org/download.html#thirdparty
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
40. https://ask.wireshark.org/
41. https://www.wireshark.org/lists/
42. http://www.wiresharktraining.com/
43. https://www.wireshark.org/faq.html
Digests
wireshark-2.4.11.tar.xz: 29125808 bytes
SHA256(wireshark-2.4.11.tar.xz)=f52f0ad49ae13bd38efe3bfe8f6abccd171426d381b1523a94e96a82cbf30c05
RIPEMD160(wireshark-2.4.11.tar.xz)=2f995e8a6866058d0d1b822b9896827465a0081a
SHA1(wireshark-2.4.11.tar.xz)=99f3a54a62b0034568b770e684721c5d08345a10
Wireshark-win32-2.4.11.exe: 52782872 bytes
SHA256(Wireshark-win32-2.4.11.exe)=398448accf7f53b8152d96008572fbf7d621e82e05fb19296b1114100fa4cdc7
RIPEMD160(Wireshark-win32-2.4.11.exe)=7a7e3cfbcaaa6bd95063ab10baaa3dfbb3edeab7
SHA1(Wireshark-win32-2.4.11.exe)=a4c005172ae8a4dee0905f6ff814e1a66ee740fc
Wireshark-win64-2.4.11.exe: 57990664 bytes
SHA256(Wireshark-win64-2.4.11.exe)=a9d7cb41f70d87ebb44a724f7ca0faa14703c7c3041d1f67de020914a4fee364
RIPEMD160(Wireshark-win64-2.4.11.exe)=fe142f31cf39dadd2cc1b36dd8658a32d8edba75
SHA1(Wireshark-win64-2.4.11.exe)=18f46f6898e3a7df180135e6b94607aa11de713f
Wireshark-win64-2.4.11.msi: 47079424 bytes
SHA256(Wireshark-win64-2.4.11.msi)=90a3a042849bc4ce4847b11eed1423e9f45353ffee87a5c4c7f29f726621e0e4
RIPEMD160(Wireshark-win64-2.4.11.msi)=606930c393b0a9ed0a9d98cb48d9cb2df5b35c4d
SHA1(Wireshark-win64-2.4.11.msi)=3bcccac8357dc5ae13f63a7000616bb86fb50a75
Wireshark-win32-2.4.11.msi: 42020864 bytes
SHA256(Wireshark-win32-2.4.11.msi)=d0cdc713970edc2246b80190f9038640db280022f187aba86419d71e77251960
RIPEMD160(Wireshark-win32-2.4.11.msi)=d595942e2aa8a9ff4b91426e11a67339ef3f70a8
SHA1(Wireshark-win32-2.4.11.msi)=070e27e193a2763dbb74a61b9efe4f3bc03a1da8
WiresharkPortable_2.4.11.paf.exe: 45457984 bytes
SHA256(WiresharkPortable_2.4.11.paf.exe)=8837fa50858b67f795f9e2be371a48d90c33cd1c2947f0a3b5bf0b8dc40d5720
RIPEMD160(WiresharkPortable_2.4.11.paf.exe)=72f0a557a170ceb6f01a568a3f054637f78ba8a9
SHA1(WiresharkPortable_2.4.11.paf.exe)=b023d96282013f399e5d47ba2c67084c2b3f0a9e
Wireshark 2.4.11 Intel 64.dmg: 42556967 bytes
SHA256(Wireshark 2.4.11 Intel
64.dmg)=6ff54e202470659ece4cfd9b361cf5d0bb5bcbbca1df5aec62adeeadb9e96d3f
RIPEMD160(Wireshark 2.4.11 Intel
64.dmg)=0d5d3fd2abac735217685afea19090dbb0027cc0
SHA1(Wireshark 2.4.11 Intel 64.dmg)=7f4a5ab7458b36b66a722d0e5069ecdd9745b73e
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-users] Wireshark 2.6.5 is now available
- Next by Date: Re: [Wireshark-users] [Wireshark-announce] Wireshark 2.6.5 is now available
- Previous by thread: [Wireshark-users] Wireshark 2.6.5 is now available
- Next by thread: Re: [Wireshark-users] [Wireshark-announce] Wireshark 2.6.5 is now available
- Index(es):