Wireshark-users: [Wireshark-users] Wireshark 1.4.12 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 27 Mar 2012 13:09:03 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.4.12.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.

     o wnpa-sec-2012-04

       The ANSI A dissector could dereference a NULL pointer and
       crash. (Bug 6823)

       Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5.

     o wnpa-sec-2012-06

       The pcap and pcap-ng file parsers could crash trying to read
       ERF data. (Bug 6804)

       Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5.

     o wnpa-sec-2012-07

       The MP2T dissector could try to allocate too much memory and
       crash. (Bug 6804)

       Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5.

     o The Windows installers now include GnuTLS 1.12.18, which fixes
       several vulnerabilities.

   The following bugs have been fixed:

     o Some PGM options are not parsed correctly. (Bug 5687)

     o dumpcap crashes when capturing from pipe to a pcap-ng file
       (e.g., when passing data from CACE Pilot to Wireshark). (Bug
       5939)

     o No error for UDP/IPv6 packet with zero checksum. (Bug 6232)

     o packetBB dissector bug: More than 1000000 items in the tree --
       possible infinite loop. (Bug 6687)

     o Ethernet traces in K12 text format sometimes give bogus
       "malformed frame" errors and other problems. (Bug 6735)

     o non-IPP packets to or from port 631 are dissected as IPP. (Bug
       6765)

     o IAX2 dissector reads past end of packet for unknown IEs. (Bug
       6815)

     o Pcap-NG files with SHB options longer than 100 bytes aren't
       recognized as pcap-NG files, and options longer than 100 bytes
       in other blocks aren't handled either. (Bug 6846)

     o Patch to fix DTLS decryption. (Bug 6847)

     o Expression... dialog is crash. (Bug 6891)

     o ISAKMP : VendorID CheckPoint : Malformed Packet. (Bug 6972)

     o Radiotap dissector lists a bogus "DBM TX Attenuation" bit.
       (Bug 7000)

     o MySQL dissector assertion. (Ask 8649)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   HTTP, ISAKMP, MySQL, PacketBB, PGM, TCP, UDP

  New and Updated Capture File Support

   Endace ERF, Pcap-NG.

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with the same libraries
   as the 32-bit installer. (Bug 3610)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.4.12.tar.bz2: 20651287 bytes
MD5(wireshark-1.4.12.tar.bz2)=92b625d3579b7cf1b05b3a022683562a
SHA1(wireshark-1.4.12.tar.bz2)=b7f4a07f9ebaeb355dbd962cd10ad942852c341b
RIPEMD160(wireshark-1.4.12.tar.bz2)=063cf7e30fcb44400401784c5f36be157aec6926

wireshark-win64-1.4.12.exe: 21853983 bytes
MD5(wireshark-win64-1.4.12.exe)=06ab1726ccfe30519138282f37c668fe
SHA1(wireshark-win64-1.4.12.exe)=c602466b9bca36578c2ac5b996ec08628d1ed37c
RIPEMD160(wireshark-win64-1.4.12.exe)=5a88d2fff85c79539a460ddb97afa74d1a1a82db

wireshark-win32-1.4.12.exe: 19838439 bytes
MD5(wireshark-win32-1.4.12.exe)=156bb58d17574530eb5f56aad98d995f
SHA1(wireshark-win32-1.4.12.exe)=f935f0ffa215f7c842f970d39d3c0ee5819030fa
RIPEMD160(wireshark-win32-1.4.12.exe)=606e9c0aa6054a354e4f713b8a7217b6728ae6c4

wireshark-1.4.12.u3p: 26371670 bytes
MD5(wireshark-1.4.12.u3p)=00129d6a56f76be2a72001fc6d028534
SHA1(wireshark-1.4.12.u3p)=1c3c3d17a0a249021e8dfa6afb6c8dbdc48cfb80
RIPEMD160(wireshark-1.4.12.u3p)=305c06ef47505bf1c9b431e9ff883fce6d0b0d6d

WiresharkPortable-1.4.12.paf.exe: 20567072 bytes
MD5(WiresharkPortable-1.4.12.paf.exe)=1de850306fa120bd4496932e9b1d77d6
SHA1(WiresharkPortable-1.4.12.paf.exe)=d7593ea31548b17cea1a401b1d83f52bbdbbf27f
RIPEMD160(WiresharkPortable-1.4.12.paf.exe)=1438d05b3a5d3cf0135048ced4cf0769956a2db2

Wireshark 1.4.12 Intel 32.dmg: 47890478 bytes
MD5(Wireshark 1.4.12 Intel 32.dmg)=51f7973e39244afdb47d824bd602c84f
SHA1(Wireshark 1.4.12 Intel
32.dmg)=f51c33cd32006dc86b59b1c25345664f6df3741d
RIPEMD160(Wireshark 1.4.12 Intel
32.dmg)=cb3f233408455cc1743e8cfda7126ce136af952f

Wireshark 1.4.12 PPC 32.dmg: 50419351 bytes
MD5(Wireshark 1.4.12 PPC 32.dmg)=eec668afbc150030cd4b540e1a04a9be
SHA1(Wireshark 1.4.12 PPC 32.dmg)=dc25b5050a61b5370c86117500db2bc8ace061c9
RIPEMD160(Wireshark 1.4.12 PPC
32.dmg)=0b44bbe78793abac2b77a09fdcc1d3c99dd24f69

Wireshark 1.4.12 Intel 64.dmg: 45566064 bytes
MD5(Wireshark 1.4.12 Intel 64.dmg)=1b3ea04af54339b0aad7c008cc68aae7
SHA1(Wireshark 1.4.12 Intel
64.dmg)=7b53b8ca9bdb17290e94b71074fa4e8a0a596690
RIPEMD160(Wireshark 1.4.12 Intel
64.dmg)=123dcb72a953021fbae24e0d4ea9ebf2beb9a592

patch-wireshark-1.4.11-to-1.4.12.diff.bz2: 106523 bytes
MD5(patch-wireshark-1.4.11-to-1.4.12.diff.bz2)=f9a5081e560f919065f18c27e5b11c47
SHA1(patch-wireshark-1.4.11-to-1.4.12.diff.bz2)=192b2283bedf4ad0168f8cc274ab8e730d3e8f5f
RIPEMD160(patch-wireshark-1.4.11-to-1.4.12.diff.bz2)=b430f88a3d21c8b74e9dbd02c695826021ea03a0
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk9yHl8ACgkQpw8IXSHylJqEnQCdFeAl/B1jqll1u9dUwSQds7MX
qlYAn1c9z6J+nOtqrKB0f7Czpg4X9wCG
=e47Z
-----END PGP SIGNATURE-----