Wireshark-announce: [Wireshark-announce] Wireshark 2.6.8 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Mon, 8 Apr 2019 13:24:03 -0700
I'm proud to announce the release of Wireshark 2.6.8. What is Wireshark? Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What’s New Bug Fixes The following vulnerabilities have been fixed: • wnpa-sec-2019-09[1] NetScaler file parser crash. Bug 15497[2]. CVE-2019-10895[3]. • wnpa-sec-2019-10[4] SRVLOC dissector crash. Bug 15546[5]. CVE-2019-10899[6]. • wnpa-sec-2019-14[7] GSS-API dissector crash. Bug 15613[8]. CVE-2019-10894[9]. • wnpa-sec-2019-15[10] DOF dissector crash. Bug 15617[11]. CVE-2019-10896[12]. • wnpa-sec-2019-17[13] LDSS dissector crash. Bug 15620[14]. CVE-2019-10901[15]. • wnpa-sec-2019-18[16] DCERPC SPOOLSS dissector crash. Bug 15568[17]. CVE-2019-10903[18]. The following bugs have been fixed: • Wireshark uninstaller fails to remove styles\qwindowsvistastyle.dll. Bug 15469[19]. • Duplicated TCP SEQ field in ICMP packets. Bug 15533[20]. • GSM-A-RR variable bitmap decoding may report ARFCNs > 1023. Bug 15549[21]. • Possible buffer overflow in function ssl_md_final for crafted SSL 3.0 sessions. Bug 15599[22]. • NFS/NLM: Wrong lock byte range in the "Info" column. Bug 15608[23]. • randpkt -r causes segfault when count > 1. Bug 15627[24]. • Packets with metadata but no data get the Protocol Info column overwritten. Bug 15630[25]. • Buildbot crash output: fuzz-2019-03-23-1789.pcap. Bug 15634[26]. New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support DCERPC SPOOLSS, DHCP, DOF, GSM A RR, GSS-API, HL7, IEEE 802.15.4, ISO 14443, LDSS, NLM, SRVLOC, TCP, and TLS New and Updated Capture File Support NetScaler and pcap New and Updated Capture Interfaces support There is no new or updated capture file support in this release. Getting Wireshark Wireshark source code and installation packages are available from https://www.wireshark.org/download.html[27]. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page[28] on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems The BER dissector might infinitely loop. Bug 1516[29]. Capture filters aren’t applied when capturing from named pipes. Bug 1814[30]. Filtering tshark captures with read filters (-R) no longer works. Bug 2234[31]. Application crash when changing real-time option. Bug 4035[32]. Wireshark and TShark will display incorrect delta times in some cases. Bug 4985[33]. Wireshark should let you work with multiple capture files. Bug 10488[34]. Getting Help Community support is available on Wireshark’s Q&A site[35] and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark’s mailing lists can be found on the web site[36]. Official Wireshark training and certification are available from Wireshark University[37]. Frequently Asked Questions A complete FAQ is available on the Wireshark web site[38]. Last updated 2019-04-08 18:43:16 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2019-09 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497 3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10895 4. https://www.wireshark.org/security/wnpa-sec-2019-10 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546 6. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899 7. https://www.wireshark.org/security/wnpa-sec-2019-14 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613 9. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894 10. https://www.wireshark.org/security/wnpa-sec-2019-15 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617 12. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896 13. https://www.wireshark.org/security/wnpa-sec-2019-17 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620 15. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901 16. https://www.wireshark.org/security/wnpa-sec-2019-18 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 18. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10903 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15469 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15533 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15549 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15599 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15608 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15627 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15630 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15634 27. https://www.wireshark.org/download.html 28. https://www.wireshark.org/download.html#thirdparty 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 35. https://ask.wireshark.org/ 36. https://www.wireshark.org/lists/ 37. http://www.wiresharktraining.com/ 38. https://www.wireshark.org/faq.html Digests wireshark-2.6.8.tar.xz: 28421408 bytes SHA256(wireshark-2.6.8.tar.xz)=b3d7dd57b637353dde2743b6ae1d12e3516ad832443d171f50f5c40312dab506 RIPEMD160(wireshark-2.6.8.tar.xz)=7d8e5eee99c90d9f98cf386de00a8fa117f8d172 SHA1(wireshark-2.6.8.tar.xz)=e54e34806a3f4d825c62c1c49c0be1d2104c5c9a Wireshark-win32-2.6.8.exe: 54311768 bytes SHA256(Wireshark-win32-2.6.8.exe)=2ed875aab384f6eda814b855d96721f44cdebea97a55f39f17588c81ed4cc77e RIPEMD160(Wireshark-win32-2.6.8.exe)=e680446b0cd7c6b9401d7f6656f8027ecb37c05f SHA1(Wireshark-win32-2.6.8.exe)=304fb306d1eb002315d6f0373dc34370c8eae07b Wireshark-win64-2.6.8.exe: 60041144 bytes SHA256(Wireshark-win64-2.6.8.exe)=d48f9ec173333b3fa781b1b3614ee1104a7ad377653357bd299d9fda2bc99ace RIPEMD160(Wireshark-win64-2.6.8.exe)=6cb1eff4ca729fb53d370ff02d58f09aef99adbe SHA1(Wireshark-win64-2.6.8.exe)=1834ee502a38940cbd3368a1020917a6b7fa1dbe Wireshark-win64-2.6.8.msi: 49405952 bytes SHA256(Wireshark-win64-2.6.8.msi)=a53963d4bb8113384f7fd2f037bff3c8b30109121302ea2962efa14da591ec4e RIPEMD160(Wireshark-win64-2.6.8.msi)=e5f46212a6c1d8f4589745df5fec27817c451e63 SHA1(Wireshark-win64-2.6.8.msi)=52d0f8fa50502cbaa73ca91e67a67ff20bddf7a0 Wireshark-win32-2.6.8.msi: 43765760 bytes SHA256(Wireshark-win32-2.6.8.msi)=df564145643207f6ca32cdeb8934a7d8a8fffd2619cb1c7646a8f59d5dac76fd RIPEMD160(Wireshark-win32-2.6.8.msi)=9a49fc0161c14855ae6f1064a26c9a918429abf7 SHA1(Wireshark-win32-2.6.8.msi)=78386c0592cd9779f2bd93c18f407f2781ce0ff2 WiresharkPortable_2.6.8.paf.exe: 37504008 bytes SHA256(WiresharkPortable_2.6.8.paf.exe)=bb59ff3230a5060259bce0f25ecd8a288a4a4c57df1c45a87a7010f827d052c5 RIPEMD160(WiresharkPortable_2.6.8.paf.exe)=0e77b04a6450d2c60966946941ba353d620c4617 SHA1(WiresharkPortable_2.6.8.paf.exe)=cd4a654b9b849e2d0d174a42585ffca85d833d0e Wireshark 2.6.8 Intel 64.dmg: 108166221 bytes SHA256(Wireshark 2.6.8 Intel 64.dmg)=1c2cd79d062c79a62d27599cb892bae7daf7ff4979f1fbcab4cd211787c07dfe RIPEMD160(Wireshark 2.6.8 Intel 64.dmg)=10fe6b5b8dee71fc981e982adebaffae3b6ce70b SHA1(Wireshark 2.6.8 Intel 64.dmg)=55f5812be738a648e642573dfdb127e9efeb5c04 You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-announce] Wireshark 3.0.1 is now available
- Next by Date: [Wireshark-announce] Wireshark 2.4.14 is now available
- Previous by thread: [Wireshark-announce] Wireshark 3.0.1 is now available
- Next by thread: [Wireshark-announce] Wireshark 2.4.14 is now available
- Index(es):