Wireshark-announce: [Wireshark-announce] Wireshark 1.6.13 is now available
Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 29 Jan 2013 13:54:03 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.6.13.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerability has been fixed.

     o wnpa-sec-2013-01

       Infinite and large loops in the Bluetooth HCI, CSN.1, DCP-ETSI
       DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS,
       SDP, and SIP dissectors. Reported by Laurent Butti. (Bugs
       8036, 8037, 8038, 8040, 8041, 8042, 8043, 8198, 8199, 8222)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-02

       The CLNP dissector could crash. Discovered independently by
       Laurent Butti and the Wireshark development team. (Bug 7871)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-03

       The DTN dissector could crash. (Bug 7945)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-04

       The MS-MMC dissector (and possibly others) could crash. (Bug
       8112)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-05

       The DTLS dissector could crash. Discovered by Laurent Butti.
       (Bug 8111)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-07

       The DCP-ETSI dissector could corrupt memory. Discovered by
       Laurent Butti. (Bug 8213)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-08

       The Wireshark dissection engine could crash. Discovered by
       Laurent Butti. (Bug 8197)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

     o wnpa-sec-2013-09

       The NTLMSSP dissector could overflow a buffer. Discovered by
       Ulf Härnhammar. (Bug X)

       Versions affected: 1.8.0 to 1.8.4, 1.6.0 to 1.6.12.

   The following bugs have been fixed:

     o The HTTP dissector does not reassemble headers when the first
       TCP segment does not contain a full header line.

     o SNMPv3 Engine ID registration. (Bug 2426)

     o Illegal character is used in temporary capture file name. (Bug
       7877)

     o Core dumped when the file is closed. (Bug 8022)

     o Wrong packet bytes are selected for ISUP CUG binary code. (Bug
       8035)

     o Decodes FCoE Group Multicast MAC address as Broadcom MAC
       address. (Bug 8046)

     o The SSL dissector stops decrypting the SSL conversation with
       Malformed Packet:SSL error messages. (Bug 8075)

     o Wrong bytes highlighted with "Find Packet...". (Bug 8085)

     o 3GPP ULI AVP. SAI is not correctly decoded. (Bug 8098)

     o Warn Dissector bug, protocol JXTA. (Bug 8212)

     o Electromagnetic Emission Parser parses field Event Id as
       Entity Id. (Bug 8227)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   Bluetooth HCI, CLNP, DCP-ETSI, DIS PDU, DOCSIS CM-STATUS, DTLS,
   DTN, Fibre Channel, GTPv2, ISUP, JXTA, MPLS, MS-MMC, NTLMSSP, R3,
   RTPS, SNMP

  New and Updated Capture File Support

   No new or updated capture file support.

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About→Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with libsmi. (Win64
   development page)

   "Closing File!" Dialog Hangs. (Bug 3046)

   Application crash when changing real-time option. (Bug 4035)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

   Wireshark and TShark will display incorrect delta times when
   displayed as a custom column. (Bug 4985)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Official Wireshark training and certification are available from
   Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.6.13.tar.bz2: 22077778 bytes
MD5(wireshark-1.6.13.tar.bz2)=d616219f1cebcebb268c9e51d847684f
SHA1(wireshark-1.6.13.tar.bz2)=ab182b3b0877dedf4219a1f0549576109faa983e
RIPEMD160(wireshark-1.6.13.tar.bz2)=4ae3b9c66ae8d430d7a91c899f70a2280dd4a2d1

wireshark-win32-1.6.13.exe: 19889896 bytes
MD5(wireshark-win32-1.6.13.exe)=7914704b49ede018b337b591e9934508
SHA1(wireshark-win32-1.6.13.exe)=84b29ca2915f27905245f2ac6b217a25a9248ba8
RIPEMD160(wireshark-win32-1.6.13.exe)=27fedebc7f5ba73826925f6213876c2872e6a54c

wireshark-win64-1.6.13.exe: 23017609 bytes
MD5(wireshark-win64-1.6.13.exe)=6e1517b3d67b746a037cc82acbca267c
SHA1(wireshark-win64-1.6.13.exe)=57e42f8c12b6bb8f1e61aca59ea95425b918f6e7
RIPEMD160(wireshark-win64-1.6.13.exe)=5e92a98550b3084e13184b8ac295fbbbbb38712e

wireshark-1.6.13.u3p: 26766499 bytes
MD5(wireshark-1.6.13.u3p)=d1451198551c7ad09d4ae3577126b4b5
SHA1(wireshark-1.6.13.u3p)=ffce5cbdc861a4c490eb25638c7271621ebe3699
RIPEMD160(wireshark-1.6.13.u3p)=e379eb9f32c16a6836e53965a9f6b46c9e76804b

WiresharkPortable-1.6.13.paf.exe: 20766458 bytes
MD5(WiresharkPortable-1.6.13.paf.exe)=2cea48102aa469ffa74b84cc60bb9c7d
SHA1(WiresharkPortable-1.6.13.paf.exe)=fadf3b801acfea3cb17d58ee020c594249e527be
RIPEMD160(WiresharkPortable-1.6.13.paf.exe)=0572fbda5b7478aa0ad799b4d99b624bb5e4eeee

Wireshark 1.6.13 Intel 64.dmg: 20360996 bytes
MD5(Wireshark 1.6.13 Intel 64.dmg)=83ee3fd0b44c0e8d4cf6aeca3f504b54
SHA1(Wireshark 1.6.13 Intel
64.dmg)=4d6c32c8a03b8ea6d87b81ee4b5e94aa016f6f35
RIPEMD160(Wireshark 1.6.13 Intel
64.dmg)=f7419627be5a7a37093543c9c998ff764947d608

Wireshark 1.6.13 PPC 32.dmg: 21275160 bytes
MD5(Wireshark 1.6.13 PPC 32.dmg)=24c505bc5f55f767afcc368657ed8030
SHA1(Wireshark 1.6.13 PPC 32.dmg)=f29fff8e8713f2ffa051f4f9608f988d324f122a
RIPEMD160(Wireshark 1.6.13 PPC
32.dmg)=7e3c0a86f2dd17f9ca103c25c532b5abb7dc7484

Wireshark 1.6.13 Intel 32.dmg: 20564015 bytes
MD5(Wireshark 1.6.13 Intel 32.dmg)=b0aad9f42c90cebd7ca6753bf7c104ed
SHA1(Wireshark 1.6.13 Intel
32.dmg)=b06af86bcda40aa95996d3d23a6ab9161ac5b344
RIPEMD160(Wireshark 1.6.13 Intel
32.dmg)=42da6306d0b4675a7c88292e289a83c4d34a26eb

patch-wireshark-1.6.12-to-1.6.13.diff.bz2: 135052 bytes
MD5(patch-wireshark-1.6.12-to-1.6.13.diff.bz2)=0b635ee19597bf63680a4015511d8a00
SHA1(patch-wireshark-1.6.12-to-1.6.13.diff.bz2)=c2e57d389df1322df83b2d72eff87d77c1ed3216
RIPEMD160(patch-wireshark-1.6.12-to-1.6.13.diff.bz2)=e6fa5b2f174a889793899ac291cc74e8f658cbdd
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlEIRPsACgkQpw8IXSHylJo1kwCdFlb30HbKE0wtGBiJzUSyR7Po
9FAAoK8tEzoSCi0BpNdifR9C9/yFL1Oz
=tZd4
-----END PGP SIGNATURE-----