ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-announce: [Wireshark-announce] Wireshark 1.4.3 is now available

Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 11 Jan 2011 15:08:55 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.4.3.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed. See the security
   advisory for details and a workaround.

     o FRAsse discovered that the MAC-LTE dissector could overflow a
       buffer. (Bug 5530)

       Versions affected: 1.2.0 to 1.2.13 and 1.4.0 to 1.4.2.

     o FRAsse discovered that the ENTTEC dissector could overflow a
       buffer. (Bug 5539)

       Versions affected: 1.2.0 to 1.2.13 and 1.4.0 to 1.4.2.

       CVE-2010-4538

     o The ASN.1 BER dissector could assert and make Wireshark exit
       prematurely. (Bug 5537)

       Versions affected: 1.4.0 to 1.4.2.

   The following bugs have been fixed:

     o AMQP failed assertion. (Bug 4048)

     o Reassemble.c leaks memory for GLIB > 2.8. (Bug 4141)

     o Fuzz testing reports possible dissector bug: TCP. (Bug 4211)

     o Wrong length calculation in new_octet_aligned_subset_bits()
       (PER dissector). (Bug 5393)

     o Function dissect_per_bit_string_display might read more bytes
       than available (PER dissector). (Bug 5394)

     o Cannot load wpcap.dll & packet.dll from Wireshark program
       directory. (Bug 5420)

     o Wireshark crashes with Copy -> Description on date/time
       fields. (Bug 5421)

     o DHCPv6 OPTION_CLIENT_FQDN parse error. (Bug 5426)

     o Information element Error for supported channels. (Bug 5430)

     o Assert when using ASN.1 dissector with loading a 'type table'.
       (Bug 5447)

     o Bug with RWH parsing in Infiniband dissector. (Bug 5444)

     o Help->About Wireshark mis-reports OS. (Bug 5453)

     o Delegated-IPv6-Prefix(123) is shown incorrect as
       X-Ascend-Call-Attempt-Limit(123). (Bug 5455)

     o "tshark -r file -T fields" is truncating exported data. (Bug
       5463)

     o gsm_a_dtap: incorrect "Extraneous Data" when decoding Packet
       Flow Identifier. (Bug 5475)

     o Improper decode of TLS 1.2 packet containing both
       CertificateRequest and ServerHelloDone messages. (Bug 5485)

     o LTE-PDCP UL and DL problem. (Bug 5505)

     o CIGI 3.2/3.3 support broken. (Bug 5510)

     o Prepare Filter in RTP Streams dialog does not work correctly.
       (Bug 5513)

     o Wrong decode at ethernet OAM Y.1731 ETH-CC. (Bug 5517)

     o WPS: RF bands decryption. (Bug 5523)

     o Incorrect LTP SDNV value handling. (Bug 5521)

     o LTP bug found by randpkt. (Bug 5323)

     o Buffer overflow in SNMP EngineID preferences. (Bug 5530)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   AMQP, ASN.1 BER, ASN.1 PER, CFM, CIGI, DHCPv6, Diameter, ENTTEC,
   GSM A GM, IEEE 802.11, InfiniBand, LTE-PDCP, LTP, MAC-LTE, MP2T,
   RADIUS, SAMR, SCCP, SIP, SNMP, TCP, TLS, TN3270, UNISTIM, WPS

  New and Updated Capture File Support

   Endace ERF, Microsoft Network Monitor, VMS TCPtrace.

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with the same libraries
   as the 32-bit installer. (Bug 3610)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.4.3.tar.bz2: 20469021 bytes
MD5(wireshark-1.4.3.tar.bz2)=ac3dcc8c128c38d9ef3d9c93d1dec83e
SHA1(wireshark-1.4.3.tar.bz2)=776c757e6a6a085232ac843ec28b026bf4ca9c8d
RIPEMD160(wireshark-1.4.3.tar.bz2)=6a63023f165b2e875296340f6a57595427a13fe7

wireshark-win32-1.4.3.exe: 19235932 bytes
MD5(wireshark-win32-1.4.3.exe)=b19d5cf7338f78e87ad0480da10ec657
SHA1(wireshark-win32-1.4.3.exe)=d7041f348c8e3f6ac1bfe652b826946e6cda50e7
RIPEMD160(wireshark-win32-1.4.3.exe)=99f7aa4ecf7907bd55870f37c54e6b8be83de863

wireshark-win64-1.4.3.exe: 21496091 bytes
MD5(wireshark-win64-1.4.3.exe)=b2dc3d0db644070aa488a42982cd74fd
SHA1(wireshark-win64-1.4.3.exe)=737c8bd2b4b74a8cb0785debb178b7e7435f1bc8
RIPEMD160(wireshark-win64-1.4.3.exe)=1da918c54bcad846f2af723297b2e06f9f700ec7

wireshark-1.4.3.u3p: 25553343 bytes
MD5(wireshark-1.4.3.u3p)=d9569650b0427fe5ec969ab8f02a76b4
SHA1(wireshark-1.4.3.u3p)=cb8724898a0ec5d318fa31cac52a1bf7101d54f2
RIPEMD160(wireshark-1.4.3.u3p)=4e113e9e1a162f04c640fa4c35e398a85b1263f1

WiresharkPortable-1.4.3.paf.exe: 20170675 bytes
MD5(WiresharkPortable-1.4.3.paf.exe)=0fc91bad10b8a6cbbdb2eb7e1bb7cf63
SHA1(WiresharkPortable-1.4.3.paf.exe)=66ac5e948d32c48b20e76e88958d13415c8d0fb5
RIPEMD160(WiresharkPortable-1.4.3.paf.exe)=792ca44ababa21245a048fb260ad7835a037ee52

Wireshark 1.4.3 Intel 32.dmg: 47563567 bytes
MD5(Wireshark 1.4.3 Intel 32.dmg)=fcad873d5cacbb2bab7a9a31bea4e90c
SHA1(Wireshark 1.4.3 Intel 32.dmg)=1a7b326dafac166cfca67a208cf08dbc93e20829
RIPEMD160(Wireshark 1.4.3 Intel
32.dmg)=3f5fcbd965a8af84e5d53ff949c06842e46a5e83

Wireshark 1.4.3 Intel 64.dmg: 44222504 bytes
MD5(Wireshark 1.4.3 Intel 64.dmg)=6039c767482080b50939736fa500d6d7
SHA1(Wireshark 1.4.3 Intel 64.dmg)=ace89413d145b8aad90c2f086642cdce7d2c29fc
RIPEMD160(Wireshark 1.4.3 Intel
64.dmg)=e63eeb438f1542bb39039582f8357f213f13f78f

Wireshark 1.4.3 PPC 32.dmg: 50111608 bytes
MD5(Wireshark 1.4.3 PPC 32.dmg)=0cb032a0f7ad006d8e3087ecebe5facc
SHA1(Wireshark 1.4.3 PPC 32.dmg)=438ce73ab3033cca2abc62ec73840b6342f1509e
RIPEMD160(Wireshark 1.4.3 PPC
32.dmg)=58eea43d1b89dbe43ca9bcd5644683849432953a

patch-wireshark-1.4.2-to-1.4.3.diff.bz2: 95896 bytes
MD5(patch-wireshark-1.4.2-to-1.4.3.diff.bz2)=a3bef819fb31648b58fc96035c3bf04b
SHA1(patch-wireshark-1.4.2-to-1.4.3.diff.bz2)=cddd8bfe0857231efae8bdd9e630226c08047b05
RIPEMD160(patch-wireshark-1.4.2-to-1.4.3.diff.bz2)=79ad37d81add1173e9baefd1ad67f81e662b2340
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk0s4wcACgkQpw8IXSHylJp/pACfZjGbNXifNVtsn8s/HYr/ez04
i80AoLE+6DNP3XYaANoRLq3MZDMCXKRJ
=E7wX
-----END PGP SIGNATURE-----