Wireshark-users: [Wireshark-users] Wireshark 1.4.7 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 31 May 2011 15:55:15 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.4.7. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. o Large/infinite loop in the DICOM dissector. (Bug 5876) Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6. o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted Diameter dictionary file could crash Wireshark. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6. o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted snoop file could crash Wireshark. (Bug 5912) Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6. o David Maciejak of Fortinet's FortiGuard Labs discovered that malformed compressed capture data could crash Wireshark. (Bug 5908) Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6. o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted Visual Networks file could crash Wireshark. (Bug 5934) Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6. The following bugs have been fixed: o AIM dissector has some endian issues. (Bug 5464) o Telephony→MTP3→MSUS doesn't display window. (Bug 5605) o Support for MS NetMon 3.x traces containing raw IPv6 ("Type 7") packets. (Bug 5817) o Service Indicator in M3UA protocol data. (Bug 5834) o IEC60870-5-104 protocol, incorrect decoding of timestamp type CP56Time2a. (Bug 5889) o DNP3 dissector incorrect constants AL_OBJ_FCTR_16NF _FDCTR_32NF _FDCTR_16NF. (Bug 5920) o 3GPP QoS: Traffic class is not decoded properly. (Bug 5928) o Wireshark crashes when creating ProtoField.framenum in Lua. (Bug 5930) o Fix a wrong mask to extract FMID from DECT packets dissector. (Bug 5947) o Incorrect DHCPv6 remote identifier option parsing. (Bug 5962) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support DICOM, IEC104, M3UA, TCP, New and Updated Capture File Support Network Monitor. Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with the same libraries as the 32-bit installer. (Bug 3610) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Training is available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.4.7.tar.bz2: 20515206 bytes MD5(wireshark-1.4.7.tar.bz2)=b5065426d5524ddc1667314f8256c2b1 SHA1(wireshark-1.4.7.tar.bz2)=ba80ed0c2aa6a12fa50155bbf5b58ad41a46024e RIPEMD160(wireshark-1.4.7.tar.bz2)=012ec4d7750c03bcc23e9140f31e778cde6fd645 wireshark-win32-1.4.7.exe: 19489962 bytes MD5(wireshark-win32-1.4.7.exe)=b286b32bc80834542466d6c3c7694004 SHA1(wireshark-win32-1.4.7.exe)=1490c036bc2ff8e2e9e95870f091475766d1586a RIPEMD160(wireshark-win32-1.4.7.exe)=c28b24289545e58d4f95e8ffe688d25d1fa3e34a wireshark-win64-1.4.7.exe: 21768442 bytes MD5(wireshark-win64-1.4.7.exe)=7a7c3d97c15428090cfbaf30a3fd9ac2 SHA1(wireshark-win64-1.4.7.exe)=bd5a1d00149b409de08a42106af3e9680274fa61 RIPEMD160(wireshark-win64-1.4.7.exe)=f1d234960afa5f39f92c4eefe560eac11c922916 wireshark-1.4.7.u3p: 25850138 bytes MD5(wireshark-1.4.7.u3p)=6278a58b2da90228daf331a3ab398be8 SHA1(wireshark-1.4.7.u3p)=b13873171b3a058aa7bf8cb8437f23155aa912e4 RIPEMD160(wireshark-1.4.7.u3p)=76c1ce791c515646172a1f8cda9b85389b8cf406 WiresharkPortable-1.4.7.paf.exe: 20429512 bytes MD5(WiresharkPortable-1.4.7.paf.exe)=fcc4027d044e185649288ccc62d3b151 SHA1(WiresharkPortable-1.4.7.paf.exe)=ddd7bcbafbde2c0f8348ee9fb5245824204823af RIPEMD160(WiresharkPortable-1.4.7.paf.exe)=dd26e8122c6c25e513a9076468c85e3f91af813b Wireshark 1.4.7 Intel 32.dmg: 47636681 bytes MD5(Wireshark 1.4.7 Intel 32.dmg)=45d4b9158527f3447614e4ad5f381044 SHA1(Wireshark 1.4.7 Intel 32.dmg)=830439aed09d7743e8d4a5362e14ffb32ce91365 RIPEMD160(Wireshark 1.4.7 Intel 32.dmg)=780d469581ca0b5c370ed33742cd6680185cd98c Wireshark 1.4.7 Intel 64.dmg: 44314730 bytes MD5(Wireshark 1.4.7 Intel 64.dmg)=9be0c60a303d3d92c5def216ff00e631 SHA1(Wireshark 1.4.7 Intel 64.dmg)=79c88f498c1977d7fcc2013f806b70eb45552a33 RIPEMD160(Wireshark 1.4.7 Intel 64.dmg)=abec547fde37db587e84a380887934286ffcca80 Wireshark 1.4.7 PPC 32.dmg: 50167767 bytes MD5(Wireshark 1.4.7 PPC 32.dmg)=6a266dffe220f9eb025c240b04ce7eb2 SHA1(Wireshark 1.4.7 PPC 32.dmg)=ad092b82f964074436908877de5ef809872c1592 RIPEMD160(Wireshark 1.4.7 PPC 32.dmg)=987ffc13df6b976c3c19f678a3da3593c989c5d1 patch-wireshark-1.4.6-to-1.4.7.diff.bz2: 52462 bytes MD5(patch-wireshark-1.4.6-to-1.4.7.diff.bz2)=e97c160e1d3dc1c51fec534779dc2d5f SHA1(patch-wireshark-1.4.6-to-1.4.7.diff.bz2)=477c89b34f4443b00b4ac4bcf39c4a39135f95bf RIPEMD160(patch-wireshark-1.4.6-to-1.4.7.diff.bz2)=2eaba00ad6fdc05ec242d3f9aa8d93cdddc9af99 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk3lcdMACgkQpw8IXSHylJrhZACdFie+rLBUME+h23jvW2HRT7r8 I0EAn3QPDQnjuHfBZIW8dpc8c6eUdGAp =X3M3 -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-users] Wireshark 1.2.17 is now available
- Previous by thread: [Wireshark-users] Wireshark 1.2.17 is now available
- Index(es):