Wireshark-announce: [Wireshark-announce] Wireshark 1.8.2 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 15 Aug 2012 13:20:33 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.8.2. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. o wnpa-sec-2012-13 The DCP ETSI dissector could trigger a zero division. Reported by Laurent Butti. (Bug 7566) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4285 o wnpa-sec-2012-14 The MongoDB dissector could go into a large loop. Reported by Ben Schmidt. (Bug 7572) Versions affected: 1.8.0 to 1.8.1. CVE-2012-4287 o wnpa-sec-2012-15 The XTP dissector could go into an infinite loop. Reported by Ben Schmidt. (Bug 7571) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4288 o wnpa-sec-2012-16 The ERF dissector could overflow a buffer. Reported by Laurent Butti. (Bug 7563) Versions affected: 1.8.0 to 1.8.1. CVE-2012-4294 CVE-2012-4295 o wnpa-sec-2012-17 The AFP dissector could go into a large loop. Reported by Stefan Cornelius. (Bug 7603) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4289 o wnpa-sec-2012-18 The RTPS2 dissector could overflow a buffer. Reported by Laurent Butti. (Bug 7568) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4296 o wnpa-sec-2012-19 The GSM RLC MAC dissector could overflow a buffer. Reported by Laurent Butti. (Bug 7561) Versions affected: 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4297 o wnpa-sec-2012-20 The CIP dissector could exhaust system memory. Reported by Ben Schmidt. (Bug 7570) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4291 o wnpa-sec-2012-21 The STUN dissector could crash. Reported by Laurent Butti. (Bug 7569) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4292 o wnpa-sec-2012-22 The EtherCAT Mailbox dissector could abort. Reported by Laurent Butti. (Bug 7562) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4293 o wnpa-sec-2012-23 The CTDB dissector could go into a large loop. Reported by Ben Schmidt. (Bug 7573) Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1. CVE-2012-4290 o wnpa-sec-2012-24 The pcap-ng file parser could trigger a zero division. (Bug 7533) Versions affected: 1.8.0 to 1.8.1. CVE-2012-4286 o wnpa-sec-2012-25 The Ixia IxVeriWave file parser could overflow a buffer. (Bug 7533) Versions affected: 1.8.0 to 1.8.1. CVE-2012-4298 The following bugs have been fixed: o Move Y.1711 out of MPLS dissector. (Bug 6787) o Patch: Add frame.interface_id support for ERF file format. (Bug 7266) o Freeze when Resizing or Moving while capturing. (Bug 7305) o Wireshark crashes when using multiple files. (Bug 7423) o Wireshark crashes on opening very short NFS pcap file. (Bug 7498) o Analyze->Apply as Filter and Analyze->Prepare a Filter cause crashes. (Bug 7506) o crashes in interface list, pipe handling. (Bug 7511) o ISDN LAPD X.31 packet traffic can not be decoded. (Bug 7514) o GIOP request_id used for sub dissectors is not assigned when decoding GIOP 1.2 Request message. (Bug 7516) o pcap-ng -ISB always writes 0 for isb_ifrecv option. (Bug 7523) o GSM classmark3 decode wrong. (Bug 7524) o mem corruption\heap corruption\div0 bugs. (Bug 7533) o DNS AD flag not shown properly. (Bug 7555) o Wireshark and TShark crash at start with invalid color filter on SPARC. (Bug 7634) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support AFP, Apache JServ Protocol v1.3, Bluetooth L2CAP, CIP, CTDB, DCP ETSI, ERF, EtherCAT Mailbox, FC Link Control, GIOP, GSM A, GSM RLC MAC, GTP, GTPv2, ISDN, LISP, MongoDB, MPLS ITU-T Y.1711 OAM, MPLS PM, NFS, RTPS2, SCTP, STUN, XTP New and Updated Capture File Support Ixia IxVeriWave, pcap-ng Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. (Win64 development page) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Official Wireshark training and certification are available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.8.2.tar.bz2: 24121798 bytes MD5(wireshark-1.8.2.tar.bz2)=5e3ea7eed50dace479e12f49d24506f4 SHA1(wireshark-1.8.2.tar.bz2)=4737d9745dbf002444ea42615243abf3bb80b943 RIPEMD160(wireshark-1.8.2.tar.bz2)=5fece857d5187b146a690fda111a0611e108c2a9 Wireshark-win32-1.8.2.exe: 20952624 bytes MD5(Wireshark-win32-1.8.2.exe)=5b21cb547e53d762d56733293fcb1443 SHA1(Wireshark-win32-1.8.2.exe)=e619813a658f0ea522cf67259276a45d68c25698 RIPEMD160(Wireshark-win32-1.8.2.exe)=0a79f676847d260efda736602fdd6a74b7dceb97 Wireshark-win64-1.8.2.exe: 26624472 bytes MD5(Wireshark-win64-1.8.2.exe)=5f604647f30b3c9e9604d0edaceaf21a SHA1(Wireshark-win64-1.8.2.exe)=c12d8d3b954c26df0a2b34ae85810223734c344d RIPEMD160(Wireshark-win64-1.8.2.exe)=6756d7cc9a68a548fab968f69bc3897b76c17084 Wireshark-1.8.2.u3p: 28364992 bytes MD5(Wireshark-1.8.2.u3p)=1de4fa4364e92f6f986c9998bc8aa34f SHA1(Wireshark-1.8.2.u3p)=a4d2d7a82e5ee581f0d5a8bf937bfe65d68bbb60 RIPEMD160(Wireshark-1.8.2.u3p)=4663cf7f1047b0b71f15f6a98f0aeee8d5100c78 WiresharkPortable-1.8.2.paf.exe: 21965928 bytes MD5(WiresharkPortable-1.8.2.paf.exe)=6a1b8bc92db4ed47ea1e42bbf1134ec2 SHA1(WiresharkPortable-1.8.2.paf.exe)=36e46b955d757950f6088cff058c0d8353c77f23 RIPEMD160(WiresharkPortable-1.8.2.paf.exe)=ca6ff5364cefccc40175f91306a5b13389b20393 Wireshark 1.8.2 Intel 32.dmg: 22056362 bytes MD5(Wireshark 1.8.2 Intel 32.dmg)=7891af48ebfdb5b722eae70d652c016d SHA1(Wireshark 1.8.2 Intel 32.dmg)=c3743c5f74554ba52b212ffa1cb9a5843a8818ee RIPEMD160(Wireshark 1.8.2 Intel 32.dmg)=951628019771b274291b30cf0a3e830664c8afb0 Wireshark 1.8.2 Intel 64.dmg: 21744672 bytes MD5(Wireshark 1.8.2 Intel 64.dmg)=24a842d1d1be59f60cbe13c344031823 SHA1(Wireshark 1.8.2 Intel 64.dmg)=5044639e002857d339e0a1f0da3ac7066f521aa2 RIPEMD160(Wireshark 1.8.2 Intel 64.dmg)=ae25d382e5259a6805c96abc0bae1aef1a5a29c0 Wireshark 1.8.2 PPC 32.dmg: 22870644 bytes MD5(Wireshark 1.8.2 PPC 32.dmg)=ce6058b1a9ee6a00841b2ef0ab19ab62 SHA1(Wireshark 1.8.2 PPC 32.dmg)=7eccc8237828df02d9ad351e290967d6b2015889 RIPEMD160(Wireshark 1.8.2 PPC 32.dmg)=27b60ad605dbf0e8728a60baddb385aace8585e9 patch-wireshark-1.8.1-to-1.8.2.diff.bz2: 73250 bytes MD5(patch-wireshark-1.8.1-to-1.8.2.diff.bz2)=ea35b096d9e7944390a8c942d1138c90 SHA1(patch-wireshark-1.8.1-to-1.8.2.diff.bz2)=8cc87bb223a2273faaf200cc9f410373e02409c4 RIPEMD160(patch-wireshark-1.8.1-to-1.8.2.diff.bz2)=97dcef9418399ff8f97b7fa61c0b09020bfe0823 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAlAsBJEACgkQpw8IXSHylJrunACfedscW6/0Dvjo+AJff2lVmhUJ CZYAn0Czuiob1hiJttDoa5EBaLeXHxjN =5xii -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-announce] Wireshark 1.6.10 is now available
- Next by Date: [Wireshark-announce] End of Life Announcement for Wireshark 1.4
- Previous by thread: [Wireshark-announce] Wireshark 1.6.10 is now available
- Next by thread: [Wireshark-announce] End of Life Announcement for Wireshark 1.4
- Index(es):