Wireshark-users: [Wireshark-users] Wireshark 2.4.13 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 27 Feb 2019 12:15:14 -0800
I'm proud to announce the release of Wireshark 2.4.13.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2019-06 ASN.1 BER and related dissectors crash. [2]Bug
       15447. [3]CVE-2019-9209.
     * [4]wnpa-sec-2019-07 TCAP dissector crash. [5]Bug 15464.
       [6]CVE-2019-9208.
     * [7]wnpa-sec-2019-08 RPCAP dissector crash. [8]Bug 15536.

   The following bugs have been fixed:
     * dftest should be distributed with the Windows installer. [9]Bug
       13825.
     * Alignment Lost after Editing Column. [10]Bug 14177.
     * Crash on applying display filters or coloring rules on capture
       files containing non-UTF-8 data. [11]Bug 14905.
     * Decoding of MEGACO/H.248 request shows the Remote descriptor as
       "Local descriptor". [12]Bug 15430.
     * Repeated NFS in Protocol Display field. [13]Bug 15443.
     * Wireshark heap out-of-bounds read in infer_pkt_encap. [14]Bug
       15463.
     * Column width and hidden issues when switching profiles. [15]Bug
       15466.
     * GTPv1-C SGSN Context Response / Forward Relocation Request decode
       GGSN address IPV6 issue. [16]Bug 15485.
     * Lua Error on startup: init.lua: dofile has been disabled due to
       running Wireshark as superuser. [17]Bug 15489.
     * Multiple out-of-bounds reads in NetScaler trace handling
       (wiretap/netscaler.c). [18]Bug 15497.
     * Wrong endianess when dissecting the "chain offset" in SMB2 protocol
       header. [19]Bug 15524.

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ASN.1 BER, BSSAP, DNP3, ETSI CAT, GTP, MEGACO, MPLS Echo, RPC, RPCAP,
   SMB2, and TCAP

  New and Updated Capture File Support

   NetScaler, and Sniffer

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [20]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [21]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([22]Bug 1419)

   The BER dissector might infinitely loop. ([23]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([24]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([25]Bug 2234)

   Application crash when changing real-time option. ([26]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([27]Bug 4985)

   Wireshark should let you work with multiple capture files. ([28]Bug
   10488)
     __________________________________________________________________

Getting Help

   Community support is available on [29]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [30]the web site.

   Official Wireshark training and certification are available from
   [31]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [32]Wireshark web site.
     __________________________________________________________________

   Last updated 2019-02-27 18:46:35 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2019-06.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9209
   4. https://www.wireshark.org/security/wnpa-sec-2019-07.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9208
   7. https://www.wireshark.org/security/wnpa-sec-2019-08.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13825
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14177
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14905
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15430
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15443
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15463
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15466
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15485
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15489
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15524
  20. https://www.wireshark.org/download.html
  21. https://www.wireshark.org/download.html#thirdparty
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  29. https://ask.wireshark.org/
  30. https://www.wireshark.org/lists/
  31. http://www.wiresharktraining.com/
  32. https://www.wireshark.org/faq.html


Digests

wireshark-2.4.13.tar.xz: 29161744 bytes
SHA256(wireshark-2.4.13.tar.xz)=f08189c2a6a479c8f8fb3b3d31a1db6fecc4f0576b442976673928829d8f01f7
RIPEMD160(wireshark-2.4.13.tar.xz)=c5d1319724f9ba0a877735d1d45e15dea4e862b7
SHA1(wireshark-2.4.13.tar.xz)=b302bfac21a06b6278f0e5645694853b0fd5bd7f

Wireshark-win32-2.4.13.exe: 52823944 bytes
SHA256(Wireshark-win32-2.4.13.exe)=1cb819ecef72c8b84c2a0c32b32e73ff38fb3fd23a2b546dd3e85e7f2bc5b659
RIPEMD160(Wireshark-win32-2.4.13.exe)=7575a5ebdd3c60a9f477384861e8fd86816467cf
SHA1(Wireshark-win32-2.4.13.exe)=d24e12fd8e13e7c7821178a6252f51f45e3001e3

Wireshark-win64-2.4.13.exe: 57986720 bytes
SHA256(Wireshark-win64-2.4.13.exe)=3882bfb41756b1aa282aca9feea1d4e042306b44984486cd3ab47b9e032913b8
RIPEMD160(Wireshark-win64-2.4.13.exe)=a8c637cef9559bb0e12de90bd8b19ae30aeac55e
SHA1(Wireshark-win64-2.4.13.exe)=ad1cbacb365c4b13080cb723a8bc56fd54959548

Wireshark-win32-2.4.13.msi: 42078208 bytes
SHA256(Wireshark-win32-2.4.13.msi)=82cf53021a67b2c4f8fcaa34b38665cca587722b470e3256cf2160474be8ac2c
RIPEMD160(Wireshark-win32-2.4.13.msi)=261c611443fc44a0dcf11344662ee6328a5eba6b
SHA1(Wireshark-win32-2.4.13.msi)=99e2ee14f0ecaea51d4d09632ec3a3de3feecd80

Wireshark-win64-2.4.13.msi: 47112192 bytes
SHA256(Wireshark-win64-2.4.13.msi)=82074b4bcb1bf1d47703bfaba73c522686a0f0b6bd5a1d24383252abe3ba3dd0
RIPEMD160(Wireshark-win64-2.4.13.msi)=2b92aa56d276082bb9ca3bba203154efd4ee6de1
SHA1(Wireshark-win64-2.4.13.msi)=3a602fe7b319e391b728baa7e399257bed5463b9

WiresharkPortable_2.4.13.paf.exe: 45444784 bytes
SHA256(WiresharkPortable_2.4.13.paf.exe)=cec9c56fc9731a306fe38baab15834ceb5b8e77d3639331babff9388c1e7c2ad
RIPEMD160(WiresharkPortable_2.4.13.paf.exe)=a5644410653223083826543c28891cfe5e743f16
SHA1(WiresharkPortable_2.4.13.paf.exe)=cdd20f0dac61c5ec672e828333b56d464d4cabc8

Wireshark 2.4.13 Intel 64.dmg: 42594187 bytes
SHA256(Wireshark 2.4.13 Intel
64.dmg)=15d3ff0c1dfb87ddbcef6c73a3f381f1b6815558a88b7649a3aa24a5c6458412
RIPEMD160(Wireshark 2.4.13 Intel
64.dmg)=a8c8e3d5fb4ec62cc50e7af12688be7ea50551de
SHA1(Wireshark 2.4.13 Intel 64.dmg)=ac0dcbf0991aab4443e2b2489f76a48fe444876b

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: signature.asc
Description: OpenPGP digital signature