Wireshark-announce: [Wireshark-announce] Wireshark 0.99.7 is now available
From: Wireshark announcements <[email protected]>
Date: Tue, 18 Dec 2007 11:06:50 -0800
I'm proud to announce the release of Wireshark 0.99.7. I'm also proud to
announce Sharkfest '08, the first-ever Wireshark users and developers
conference, and SharkNet, an enterprise maintenance and support program for
Wireshark.

Shameless Promotion

    Sharkfest '08 will be held March 31 to April 2 in Los Altos Hills,
    CA. At Sharkfest you'll have the opportunity to meet many of the
    people behind Wireshark and WinPcap, and take advantage of the wide
    variety of courses that will be available. It's an excellent
    opportunity to learn how to use Wireshark more effectively.

    SharkNet provides a guaranteed response time for Wireshark support
    issues, development assistance, discounts on Wireshark University
    courses, and many other features.

    For more information on Sharkfest and SharkNet, visit
    http://www.cacetech.com or send email to [email protected]

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development, and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed. See the security
   advisory for details and a workaround.

     o Wireshark could crash when reading an MP3 file.

       Versions affected: 0.99.6

     o Beyond Security discovered that Wireshark could loop
       excessively while reading a malformed DNP packet.

       Versions affected: 0.10.12 to 0.99.6

     o Stefan Esser discovered a buffer overflow in the SSL
       dissector.

       Versions affected: 0.99.0 to 0.99.6

     o The ANSI MAP dissector could be susceptible to a buffer
       overflow on some platforms.

       Versions affected: 0.99.5 to 0.99.6

     o The Firebird/Interbase dissector could go into an infinite
       loop or crash.

       Versions affected: 0.99.6

     o The NCP dissector could cause a crash.

       Versions affected: 0.99.6

     o The HTTP dissector could crash on some systems while decoding
       chunked messages.

       Versions affected: 0.10.14 to 0.99.6

     o The MEGACO dissector could enter a large loop and consume
       system resources.

       Versions affected: 0.9.14 to 0.99.6

     o The DCP ETSI dissector could enter a large loop and consume
       system resources.

       Versions affected: 0.99.6

     o Fabiodds discovered a buffer overflow in the iSeries (OS/400)
       Communication trace file parser.

       Versions affected: 0.99.0 to 0.99.6

     o The PPP dissector could overflow a buffer.

       Versions affected: 0.99.6

     o The Bluetooth SDP dissector could go into an infinite loop.

       Versions affected: 0.99.2 to 0.99.6

     o A malformed RPC Portmap packet could cause a crash.

       Versions affected: 0.8.16 to 0.99.6

     o The IPv6 dissector could loop excessively.

       Versions affected: 0.99.6

     o The USB dissector could loop excessively or crash.

       Versions affected: 0.99.6

     o The SMB dissector could crash.

       Versions affected: 0.99.6

     o The RPL dissector could go into an infinite loop.

       Versions affected: 0.9.8 to 0.99.6

     o The WiMAX dissector could crash due to unaligned access on
       some platforms.

       Versions affected: 0.99.6

     o The CIP dissector could attempt to allocate a huge amount of
       memory and crash.

       Versions affected: 0.9.14 to 0.99.6

   The following bugs have been fixed:

     o Handling of non-ASCII file names and paths has been improved.

     o Wireshark could crash while editing a coloring rule or a UAT
       table.

     o The display filter code could crash while bitwise ANDing an
       IPv4 address.

  New and Updated Features

   The following features are new (or have been significantly
   updated) since the last release:

     o Most of the capture code has been moved out of the GUI, which
       means that Wireshark no longer needs to be run as root.

     o Many display filter names have been cleaned up. If your
       favorite display filter just went missing, please consult the
       display filter reference to find out where it ended up.

     o You can now filter directly on SNMP OIDs.

     o IO graphs have more display options, and you can now export
       graphs.

     o You can now follow UDP streams in addition to TCP and SSL
       streams.

     o You can now disable coloring rules without deleting them.

     o Main window toolbar buttons are now available even when the
       window is small.

     o The version of WinPcap that ships with the Windows installers
       has been updated to 4.0.2.

     o The Windows installers now include a "services" file, which
       maps port numbers to names.

     o The Windows installer now enables npf.sys by default under
       Vista. Wireshark will print a warning at startup if npf.sys
       isn't loaded under Vista.

     o Optimizations have been applied in some places to make
       Wireshark start up and run faster.

  New Protocol Support

   ANSI TCAP, application/xcap-error (MIME type), CFM, DPNSS,
   EtherCAT, ETSI e2/e4, H.282, H.460, H.501, IEEE 802.1ad and
   802.1ah, IMF (RFC 2822), RSL, SABP, T.125, TNEF, TPNCP, UNISTIM,
   Wake on LAN, WiMAX ASN Control Plane, X.224,

  Updated Protocol Support

   3Com XNS, 3G A11, ACN, ACP123, ACSE, AIM, ANSI IS-637-A, ANSI MAP,
   Armagetronad, BACapp, BACnet, BER, BFD, BGP, Bluetooth, CAMEL,
   CDT, CFM, CIP, Cisco ERSPAN, CLNP, CMIP, CMS, COPS, CTDB, DCCP,
   DCERPC ATSVC, DCERPC PNIO, DCERPC SAMR, DCERPC, DCOM CBA-ACCO, DCP
   ETSI, DEC DNA, DFS, DHCP/BOOTP, DHCPv6, DIAMETER, DISP, DMP, DNP,
   DNS, DOP, DTLS, DUA, eDonkey, ELSM, ESL, Ethernet, FC ELS, FC,
   FCOE, FTAM, FTP, GDSDB, GIOP, GPRS-LLC, GSM A, GSM MAP, GTP, HSRP,
   HTTP, IAX2, ICMPv6, IEEE 802.11, INAP, IP, IPMI, IPv6, ISAKMP,
   ISIS, iSNS, ISUP, IUUP, JXTA, K12, Kerberos, L2TP, LAPD, LDAP,
   LINX, LPD, LWAPP, MEGACO, MIKEY, MIME Multipart, MMS, MP2T, MPEG
   PES, MPEG, MTP2, MySQL, NBAP, NetFlow, nettl, NFS, NSIP, OSPF,
   P_MUL, PANA, PER, PKCS#12, PMIPv6, PN-PTCP, PN-RT, PPI, PPPoE,
   PRES, PROFINET, PTP, Q.932 ROS, Q.932, QSIG, Radiotap, RADIUS,
   RANAP, RNSAP, ROS, RTCP, RTP, RTSE, RTSP, SCCP, SCTP, SDP,
   SIGCOMP, SIP, Slow Protocols, SMB, SMPP, SMTP, SNDCP, SNMP, SRP,
   SSL, STANAG 4406, STUN2, TCAP, TCP, text/media, TIPC, ULP, UMA,
   UMTS FP, V5UA, VNC, WiMAX M2M, WiMAX, WLCCP, X.411, X.420, X.509
   SAT, XML,

  New and Updated Capture File Support

   Catapult DCT 2000, Endace ERF, Juniper NetScreen snoop, Visual
   Networks, Windows Sniffer (NetXRay)

Getting Wireshark

   Wireshark source code and installation packages are available from
   the download page on the main web site.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Saving to the currently-open file doesn't work under Windows. (Bug
   2080)

   The Filter button is nonfunctional in the file dialogs under
   Windows. (Bug 942)

   GTK+ 2.x renders white text on 8-bit displays under Windows. You
   can work around this by installing the GTK+ 1.2 version of
   Wireshark or by increasing your display depth to 15 bits or more.

Getting Help

   Community support is available on the wireshark-users mailing
   list. Subscription information and archives for all of Wireshark's
   mailing lists can be found on the web site.

   Commercial support, training, and development services are
   available from CACE Technologies.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.

References

   Visible links
   . http://www.wireshark.org/security/wnpa-sec-2007-02.html
   . http://www.wireshark.org/docs/dfref/
   . http://www.wireshark.org/download.html
   . http://www.wireshark.org/download.html#otherplat
   . http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2080
   . http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=942
   . http://bugzilla.gnome.org/show_bug.cgi?id=438652
   . http://www.wireshark.org/lists/
   . http://www.cacetech.com/
   . http://www.wireshark.org/faq.html