Wireshark-users: [Wireshark-users] Wireshark 1.0.7 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 08 Apr 2009 18:43:18 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.0.7. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. What's New Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. o The PROFINET dissector was vulnerable to a format string overflow. (Bug 3382) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1210 o The LDAP dissector could crash on Windows. (Bug 3262) Versions affected: 0.99.2 to 1.0.6 CVE-2009-1267 o The Check Point High-Availability Protocol (CPHAP) dissector could crash. (Bug 3269) Versions affected: 0.9.6 to 1.0.6 CVE-2009-1268 o Wireshark could crash while loading a Tektronix .rf5 file. (Bug 3366) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1269 The following bugs have been fixed: o Correct use of proto_tree_add_int_format() (Bug 3048) o RTP dynamic payload clock rates incorrectly determined (Bug 3067) o TShark fails to properly close capture files when opening new ones (Bug 3172) o ANSI MAP digits type decode and bitmask corrections (Bug 3233) o Two small patches for ipvs-syncd dissector (Bug 3236) o BGP capability dissection failure (Bug 3247) o ANSI MAP fix for missing MEID/MSC ID number in RegNot (Bug 3255) o BACnet PrivateTransferError shows malformed packet (Bug 3257) o Windows silent installer is not that silent (Bug 3260) o Crash in ASN.1 dissector when using 'type table' (Bug 3271) o 802.11n SM Power save mode value 0x3 label is incorrect (Bug 3276) o 802.11 WME ie displayed incorrectly (Bug 3284) o "Copy as filter" from the packet list has been fixed. New and Updated Features There are no new or updated features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ACN, ANSI MAP, ASN.1 BACnet, BGP, CPHAP, GSM MAP, IEEE 802.11, IPVS, LDAP, NetFlow/IPFIX, PROFINET, RTP, SNMP, WSP New and Updated Capture File Support (TBD) Getting Wireshark Wireshark source code and installation packages are available from the download page on the main web site. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. Known Problems Wireshark may appear offscreen on multi-monitor Windows systems. (Bug 553) Wireshark might make your system disassociate from a wireless network on OS X. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Wireshark can't dynamically update the packet list. This means that host name resolutions above a certain response time threshold won't show up in the packet list. (Bug 1605) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Wireshark might freeze when reading from a pipe. (Bug 2082) Capturing from named pipes might be delayed on Windows. (Bug 2200) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) Getting Help Community support is available on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Commercial support and development services are available from CACE Technologies. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.0.7.tar.bz2: 13289668 bytes MD5(wireshark-1.0.7.tar.bz2)=34807e6f21a0118d9f1961c5c5f59d66 SHA1(wireshark-1.0.7.tar.bz2)=ac7253ed010ffe8075de21fde362bb162b59f279 RIPEMD160(wireshark-1.0.7.tar.bz2)=cd52704cde4afe57cccb09733c7f0ddfef2363e9 wireshark-1.0.7.tar.gz: 17027359 bytes MD5(wireshark-1.0.7.tar.gz)=0bfefcb22d86c39d377be45a78ef41ac SHA1(wireshark-1.0.7.tar.gz)=413918b1dc27ed8f4f9b15c62d74b653d5936b12 RIPEMD160(wireshark-1.0.7.tar.gz)=840037871875540c92745d7a6cfd208b976a1cef wireshark-setup-1.0.7.exe: 22286723 bytes MD5(wireshark-setup-1.0.7.exe)=f6ff85d5046f61ec8de23b15e088d76c SHA1(wireshark-setup-1.0.7.exe)=4477618212a2caa790aa2904f2c4c0c91152c1d7 RIPEMD160(wireshark-setup-1.0.7.exe)=1756fe08c38005c5106c35a9d58a021883a7a903 wireshark-1.0.7.u3p: 20062785 bytes MD5(wireshark-1.0.7.u3p)=90cf45f1d1ae1085f09e70a4e345ee42 SHA1(wireshark-1.0.7.u3p)=254573d1674d9dc711190d19d92b5edd0cdd5644 RIPEMD160(wireshark-1.0.7.u3p)=6b3cf92379f7eeabe2368d50cec0f55d92f8791f WiresharkPortable-1.0.7.paf.exe: 17500576 bytes MD5(WiresharkPortable-1.0.7.paf.exe)=7ec4df61426682ff9b011b787d12ea14 SHA1(WiresharkPortable-1.0.7.paf.exe)=caf1c84e2e30aac4ddc012199e0225689511ea7b RIPEMD160(WiresharkPortable-1.0.7.paf.exe)=66c7e2eab8e48a9054809ebae18f6242a13c983c Wireshark 1.0.7 Intel.dmg: 32421212 bytes MD5(Wireshark 1.0.7 Intel.dmg)=2b45eaf784c039c4b7a22a4c25b6ad6b SHA1(Wireshark 1.0.7 Intel.dmg)=0c6a3e93df26f1aae6210f2881eb57560c210c1b RIPEMD160(Wireshark 1.0.7 Intel.dmg)=1b367a8e0117b0af64f55a26f77e8b864fe1b809 Wireshark 1.0.7 PPC.dmg: 34849613 bytes MD5(Wireshark 1.0.7 PPC.dmg)=7b7fe869e3af4353f464da6dffa17972 SHA1(Wireshark 1.0.7 PPC.dmg)=71ec59938f3b3801338ad1ce5add1648c826efad RIPEMD160(Wireshark 1.0.7 PPC.dmg)=98f8e256c3645af5825f52257fe97066bfa64e52 patch-wireshark-1.0.6-to-1.0.7.diff.bz2: 165460 bytes MD5(patch-wireshark-1.0.6-to-1.0.7.diff.bz2)=6c7e68bfa2d2374af34160fdc2d40219 SHA1(patch-wireshark-1.0.6-to-1.0.7.diff.bz2)=81b13da97fc900f2b0b0cbc7cb9a5c0a66d157cc RIPEMD160(patch-wireshark-1.0.6-to-1.0.7.diff.bz2)=a1559fc475918fe121285ad41d331fa2bfadaff4 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkndUrYACgkQpw8IXSHylJoXoQCgjqSs/5BnIO1Md3a0LQqwIy8S PYsAoMu4rZ9xrBtrFj8PeGRggFO3uy1Z =dtEg -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-users] Configure coloring rule for [TCP segment of a reassembled PDU]
- Next by Date: Re: [Wireshark-users] Configure coloring rule for [TCP segment of a reassembled PDU]
- Previous by thread: Re: [Wireshark-users] Configure coloring rule for [TCP segment of a reassembled PDU]
- Next by thread: [Wireshark-users] Debian Bug report logs - #520318, RFH: wireshark -- network traffic analyzer
- Index(es):