Wireshark-announce: [Wireshark-announce] Wireshark 1.10.4 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 17 Dec 2013 11:47:14 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.10.4. __________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed. * [1]wnpa-sec-2013-66 The SIP dissector could go into an infinite loop. Discovered by Alain Botti. ([2]Bug 9388) Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11 [3]CVE-2013-7112 * [4]wnpa-sec-2013-67 The BSSGP dissector could crash. Discovered by Laurent Butti. ([5]Bug 9488) Versions affected: 1.10.0 to 1.10.3 [6]CVE-2013-7113 * [7]wnpa-sec-2013-68 The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11 [8]CVE-2013-7114 The following bugs have been fixed: * "On-the-wire" packet lengths are limited to 65535 bytes. ([9]Bug 8808, ws-buglink:9390) * Tx MCS set is not interpreted properly in WLAN beacon frame. ([10]Bug 8894) * VoIP Graph Analysis window - some calls are black. ([11]Bug 8966) * Wireshark fails to decode single-line, multiple Contact: URIs in SIP responses. ([12]Bug 9031) * epan/follow.c - Incorrect "bytes missing in capture file" in "check_fragments" due to an unsigned int wraparound?. ([13]Bug 9112) * gsm_map doesn't decode MAPv3 reportSM-DeliveryStatus result. ([14]Bug 9382) * Incorrect NFSv4 FATTR4_SECURITY_LABEL value. ([15]Bug 9383) * Timestamp decoded for Gigamon trailer is not padded correctly. ([16]Bug 9433) * SEL Fast Message Bug-fix for Signed 16-bit Integer Fast Meter Messages. ([17]Bug 9435) * DNP3 Bug Fix for Analog Data Sign Bit Handling. ([18]Bug 9442) * GSM SMS User Data header fill bits are wrong when using a 7 bits ASCII / IA5 encoding. ([19]Bug 9478) * WCDMA RLC dissector cannot assemble PDUs with SNs skipped and wrap-arounded. ([20]Bug 9505) * DTLS: fix buffer overflow in mac check. ([21]Bug 9512) * [PATCH] Correct data length in SCSI_DATA_IN packets (within iSCSI). ([22]Bug 9521) * GSM SMS UDH EMS control expects 4 octets instead of 3 with OPTIONAL 4th. ([23]Bug 9550) * Fix "decode as ..." for packet-time.c. ([24]Bug 9563) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ANSI IS-637-A, BSSGP, DNP3, DVB-BAT, DVB-CI, GSM MAP, GSM SMS, IEEE 802.11, iSCSI, NFSv4, NTLMSSP v2, RLC, SEL FM, SIP, and Time New and Updated Capture File Support Pcap-ng. __________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [25]http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [26]download page on the Wireshark web site. __________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([27]Bug 1419) The BER dissector might infinitely loop. ([28]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([29]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([30]Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. ([31]Win64 development page) Resolving ([32]Bug 9044) reopens ([33]Bug 3528) so that Wireshark no longer automatically decodes gzip data when following a TCP stream. Application crash when changing real-time option. ([34]Bug 4035) Hex pane display issue after startup. ([35]Bug 4056) Packet list rows are oversized. ([36]Bug 4357) Summary pane selected frame highlighting not maintained. ([37]Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. ([38]Bug 4985) __________________________________________________________ Getting Help Community support is available on [39]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [40]the web site. Official Wireshark training and certification are available from [41]Wireshark University. __________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [42]Wireshark web site. __________________________________________________________ Last updated 2013-12-17 09:19:17 PST References 1. https://www.wireshark.org/security/wnpa-sec-2013-66.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9388 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112 4. https://www.wireshark.org/security/wnpa-sec-2013-67.html 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113 7. https://www.wireshark.org/security/wnpa-sec-2013-68.html 8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8894 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8966 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9112 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9382 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9383 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9433 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9435 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9442 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9478 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9505 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9512 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9521 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9550 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9563 25. http://www.wireshark.org/download.html 26. http://www.wireshark.org/download.html#thirdparty 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 31. https://wiki.wireshark.org/Development/Win64 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 39. http://ask.wireshark.org/ 40. http://www.wireshark.org/lists/ 41. http://www.wiresharktraining.com/ 42. http://www.wireshark.org/faq.html Digests wireshark-1.10.4.tar.bz2: 26675167 bytes MD5(wireshark-1.10.4.tar.bz2)=48b59af6c560adacd86078e9d4b109e5 SHA1(wireshark-1.10.4.tar.bz2)=da722f257968d5a8f8e7a6d7afb4b853d5e519b7 RIPEMD160(wireshark-1.10.4.tar.bz2)=844bb0001ecc754b3eb99015e7127147375ebd10 Wireshark-win32-1.10.4.exe: 22122608 bytes MD5(Wireshark-win32-1.10.4.exe)=ef40385d96852e81ddb3fef70324e88b SHA1(Wireshark-win32-1.10.4.exe)=0d27ce1411e3e635095417846441816074b0b5bd RIPEMD160(Wireshark-win32-1.10.4.exe)=32e78fcdc47047bc5af97b1ac203556b9977d9fe Wireshark-win64-1.10.4.exe: 27976248 bytes MD5(Wireshark-win64-1.10.4.exe)=f6d21d40bc9628378cd85f86e4016d43 SHA1(Wireshark-win64-1.10.4.exe)=a0715737ac077f3a77f466da48eb3c19093d5efb RIPEMD160(Wireshark-win64-1.10.4.exe)=04273965307f666871c014813b28ae5e729b90a6 Wireshark-1.10.4.u3p: 30597773 bytes MD5(Wireshark-1.10.4.u3p)=22cbd0588618faaaa5bfd583ff92065b SHA1(Wireshark-1.10.4.u3p)=fc858c767796883a3e0bf93940f9d3c83595b7cd RIPEMD160(Wireshark-1.10.4.u3p)=1adc7b0235b273df365acbac9d415ad329a8baca WiresharkPortable-1.10.4.paf.exe: 23483176 bytes MD5(WiresharkPortable-1.10.4.paf.exe)=496a143dcc78e40e0d96a0e83fb46dca SHA1(WiresharkPortable-1.10.4.paf.exe)=bc584b5ea9d36747381965d5eba00cc3068775e9 RIPEMD160(WiresharkPortable-1.10.4.paf.exe)=2960c06f17523c36e8f60cbe06abe3a81d1439e7 Wireshark 1.10.4 Intel 64.dmg: 24721159 bytes MD5(Wireshark 1.10.4 Intel 64.dmg)=c04746d6cf2241b8cb4c4ffa096d5fc8 SHA1(Wireshark 1.10.4 Intel 64.dmg)=51969c2134d867f32ee4b03babb800826bae0277 RIPEMD160(Wireshark 1.10.4 Intel 64.dmg)=e1b8a00240b06408fa177758dad31c3c615ac715 Wireshark 1.10.4 Intel 32.dmg: 20419412 bytes MD5(Wireshark 1.10.4 Intel 32.dmg)=a33fee9e9512c20fc9cc03a93e225a9f SHA1(Wireshark 1.10.4 Intel 32.dmg)=6d227169fa9f8fedfedd90c6aa8bcd754272e396 RIPEMD160(Wireshark 1.10.4 Intel 32.dmg)=c1aabbb670098630f04bd23bd4acbaaf810e5e5b patch-wireshark-1.10.3-to-1.10.4.bz2: 100208 bytes MD5(patch-wireshark-1.10.3-to-1.10.4.bz2)=0db0c26d438b84fba8f511414f708474 SHA1(patch-wireshark-1.10.3-to-1.10.4.bz2)=dbec971de047fa69f391f564ff2cbeaddfc96eb2 RIPEMD160(patch-wireshark-1.10.3-to-1.10.4.bz2)=397a75bdb723d6d472775c7ee0ad98d049a2e3a5 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (Darwin) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlKwqkIACgkQpw8IXSHylJrpUgCdEdLIKlq3lnu0/LqDk4+kB5jY 57kAoNFdAktiIq8qhFbJWE1Q50v7AsDs =v98O -----END PGP SIGNATURE-----
- Next by Date: [Wireshark-announce] Wireshark 1.8.12 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.8.12 is now available
- Index(es):