Wireshark-announce: [Wireshark-announce] Wireshark 0.99.4 is now available
Date Prev
·
Date Next
·
Thread Prev
·
Thread Next
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 31 Oct 2006 17:40:47 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Wireshark 0.99.4 has been released. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. What's New Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. o The HTTP dissector could crash. (Bugs 1050 and 1079) Versions affected: 0.99.3. CVE-2006-5468 o The LDAP dissector (and possibly others) could crash. (Bug 1054) Versions affected: 0.99.3. CVE-2006-5740 o The XOT dissector could attempt to allocate a large amount of memory and crash. (Bug 1133) Versions affected: 0.9.8 to 0.99.3. CVE-2006-4805 o The WBXML dissector could crash. (Bug 1134) Versions affected: 0.10.11 to 0.99.3. CVE-2006-5469 o The MIME Multipart dissector was susceptible to an off-by-one error. (Bug 1135) Versions affected: 0.10.1 to 0.99.3. CVE-2006-4574 o If AirPcap support was enabled, parsing a WEP key could sometimes cause a crash. Versions affected: 0.99.3. The following bugs have been fixed: o The file set dialog could grow excessively large. (Bug 331) o Trying to save flow data may crash Wireshark. (Bug 396) o It may not be possible to re-order coloring rules under Windows. (Bug 699) o Printing each packet to a new page didn't work under Windows. (Bug 707) o The personal hosts configuration file wasn't being parsed correctly. (Bug 795) o "Save as" to an existing file wasn't allowed. (Bug 927) o The SNMP dissector was not handling 64-bit counters properly. (Bug 1047) o Wireshark and TShark would fail to start under Windows while trying to acquire a crypto context. (Bug 1096) o The HTTP content-length field was a string instead of an integer. (Bug 1109) o Invalid characters could show up in PDML output. (Bug 1110) New and Updated Features The following features are new (or have been significantly updated) since the last release: o AirPcap, support (which provides raw mode capture under Windows) has been enhanced to allow capturing on multiple AirPcap adapters simultaneously using the Multi-Channel Aggregator. o VoIP call playback has been enhanced. If Wireshark is linked with the PortAudio library, you can play back G.711 conversations. This feature is present in the standard Windows installer. o The capture interface dialog display has been enhanced. o The "Save" button has been removed from the "Ok" / "Apply" / "Cancel" button group in the following dialogs: o Edit/Preferences o View/Coloring Rules o Capture/Capture Filters o Analyze/Display Filters o Analyze/Enabled Protocols If you're fond of the "Save" button it can be resurrected in the User Interface preferences. o Reading from stdin ("-i -") now works under Windows. o Expert analysis has been improved. o Wireshark now supports USB as a media type. If you're running a Linux distribution with version 2.6.11 of the kernel or greater and you have the usbmon module enabled and you have a recent CVS version of libpcap (post-0.9.5) installed you can also do live captures. More details can be found at the USB capture setup page on the wiki. o The number of WEP keys that the user can specify in the IEEE 802.11 protocol preferences has been increased from 4 to 64. New Protocol Support Enea LINX, Ethernet Powerlink (v1 and v2), H.248 Q.1950 Annex A, Linux pktgen, MP2T, NEWMAIL, PNG, SCSI OSD, UDLD, UMTS FP, USB, WLCCP, WZCSVC Updated Protocol Support 3Com NJACK, 802.11, ACSE, AH, ALCAP, ANSI MAP, ATM, ASN.1, BACapp, BER, BGP, BSSAP, Camel, Catapult DCT2000, CFlow, CLNP, Common Windows networking, DAP, DCERPC (DCERPC, ATSVC, DFS, EFS, EPM, EVENTLOG, INITSHUTDOWN, MAPI, NT, PIPE, SAMR, SPOOLSS, SRVSVC, SVCCTL, WINREG), DCOM (DCOM, CBA-ACCO, SYSACT), DIAMETER, DISP, DNS, DOP, DSP, ESP, Ethernet, FC, FCP, GSM A, GSM MAP, GSM SMS, GSSAPI, GTP, H.225, H.245, H.248, HTTP, ICQ, IKE, ISAKMP, iSCSI, ISUP, IUUP, Kerberos 4, LAP-D, LDAP, LLC, LogotypeCertExtn, MEGACO, MIME Multipart, MIP6, MMS, MSRP, MTP3, NCP, NDMP, NDPS, NFS, NTP, OSI, PER, PN-MRP, PPP, 19154Q.931, RADIUS, Redback, RPC, RTCP, RTP, SCCP, SCSI, SDP, SIP, SMB, SMRSE, SNMP, SSL, STANAG 5066, STP, TCAP, TCP, TFTP, TIPC, UDP, UMA, VLAN, VNC, VRRP, X.509ce X11, YMSG, WTLS Removed Protocols The CISCOWL dissector has been superseded by WLCCP. New and Updated Capture File Support Catapult DCT2000, EyeSDN, iSeries Getting Wireshark The source code and Windows installer can be downloaded immediately from http://www.wireshark.org/download/ . ------------------------------------------------------------------- Digests MD5(wireshark-0.99.4.tar.gz)=2556a31d0d770dd1990bd67b98bd2f9b SHA1(wireshark-0.99.4.tar.gz)=9c4f4bb214dad25f27e3ab346bf74701f9798f1e RIPEMD160(wireshark-0.99.4.tar.gz)=55582d5fc92b0fd380629766610a0aee93916e5d MD5(wireshark-0.99.4.tar.bz2)=05fada181e12bfa94b52f0b10395b28c SHA1(wireshark-0.99.4.tar.bz2)=696216d794b418da3cb0a1829281ef65bf3e64ff RIPEMD160(wireshark-0.99.4.tar.bz2)=6bf940af951ddfcf66157a8cb299e6342dd3f955 MD5(wireshark-setup-0.99.4.exe)=44edc28501c52c5a38e7351ea57d7873 SHA1(wireshark-setup-0.99.4.exe)=b245151b0dca0a88c65e7900ce7558ea89d29bc2 RIPEMD160(wireshark-setup-0.99.4.exe)=32710d62eed42bb8237de688736c7c688f2b8d03 MD5(patch-wireshark-0.99.3a-to-wireshark-0.99.4.diff.bz2)=25f2e9d14125c27133658c9a9dacda30 SHA1(patch-wireshark-0.99.3a-to-wireshark-0.99.4.diff.bz2)=9da137198dc6d4c32c4911f061e1ee4261ed5ff4 RIPEMD160(patch-wireshark-0.99.3a-to-wireshark-0.99.4.diff.bz2)=10d009c5c566ab584d66c32a156e6c6d487790ac -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFFR/sZpw8IXSHylJoRAtWNAJ40xXMscRdrqATfArHwC/9wgt+8NwCfY04C Cs9oYabtLh+1o1mQC3/EcZI= =6wJi -----END PGP SIGNATURE-----