Wireshark-announce: [Wireshark-announce] Wireshark 1.4.7 is now available
Date Prev Thread Prev
From: Wireshark announcements <[email protected]>
Date: Tue, 31 May 2011 15:55:15 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.4.7.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed. See the security
   advisory for details and a workaround.

     o Large/infinite loop in the DICOM dissector. (Bug 5876)

       Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

     o Huzaifa Sidhpurwala of the Red Hat Security Response Team
       discovered that a corrupted Diameter dictionary file could
       crash Wireshark.

       Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

     o Huzaifa Sidhpurwala of the Red Hat Security Response Team
       discovered that a corrupted snoop file could crash Wireshark.
       (Bug 5912)

       Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

     o David Maciejak of Fortinet's FortiGuard Labs discovered that
       malformed compressed capture data could crash Wireshark. (Bug
       5908)

       Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

     o Huzaifa Sidhpurwala of the Red Hat Security Response Team
       discovered that a corrupted Visual Networks file could crash
       Wireshark. (Bug 5934)

       Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

   The following bugs have been fixed:

     o AIM dissector has some endian issues. (Bug 5464)

     o Telephony→MTP3→MSUS doesn't display window. (Bug 5605)

     o Support for MS NetMon 3.x traces containing raw IPv6 ("Type
       7") packets. (Bug 5817)

     o Service Indicator in M3UA protocol data. (Bug 5834)

     o IEC60870-5-104 protocol, incorrect decoding of timestamp type
       CP56Time2a. (Bug 5889)

     o DNP3 dissector incorrect constants AL_OBJ_FCTR_16NF
       _FDCTR_32NF _FDCTR_16NF. (Bug 5920)

     o 3GPP QoS: Traffic class is not decoded properly. (Bug 5928)

     o Wireshark crashes when creating ProtoField.framenum in Lua.
       (Bug 5930)

     o Fix a wrong mask to extract FMID from DECT packets dissector.
       (Bug 5947)

     o Incorrect DHCPv6 remote identifier option parsing. (Bug 5962)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   DICOM, IEC104, M3UA, TCP,

  New and Updated Capture File Support

   Network Monitor.

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with the same libraries
   as the 32-bit installer. (Bug 3610)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.4.7.tar.bz2: 20515206 bytes
MD5(wireshark-1.4.7.tar.bz2)=b5065426d5524ddc1667314f8256c2b1
SHA1(wireshark-1.4.7.tar.bz2)=ba80ed0c2aa6a12fa50155bbf5b58ad41a46024e
RIPEMD160(wireshark-1.4.7.tar.bz2)=012ec4d7750c03bcc23e9140f31e778cde6fd645

wireshark-win32-1.4.7.exe: 19489962 bytes
MD5(wireshark-win32-1.4.7.exe)=b286b32bc80834542466d6c3c7694004
SHA1(wireshark-win32-1.4.7.exe)=1490c036bc2ff8e2e9e95870f091475766d1586a
RIPEMD160(wireshark-win32-1.4.7.exe)=c28b24289545e58d4f95e8ffe688d25d1fa3e34a

wireshark-win64-1.4.7.exe: 21768442 bytes
MD5(wireshark-win64-1.4.7.exe)=7a7c3d97c15428090cfbaf30a3fd9ac2
SHA1(wireshark-win64-1.4.7.exe)=bd5a1d00149b409de08a42106af3e9680274fa61
RIPEMD160(wireshark-win64-1.4.7.exe)=f1d234960afa5f39f92c4eefe560eac11c922916

wireshark-1.4.7.u3p: 25850138 bytes
MD5(wireshark-1.4.7.u3p)=6278a58b2da90228daf331a3ab398be8
SHA1(wireshark-1.4.7.u3p)=b13873171b3a058aa7bf8cb8437f23155aa912e4
RIPEMD160(wireshark-1.4.7.u3p)=76c1ce791c515646172a1f8cda9b85389b8cf406

WiresharkPortable-1.4.7.paf.exe: 20429512 bytes
MD5(WiresharkPortable-1.4.7.paf.exe)=fcc4027d044e185649288ccc62d3b151
SHA1(WiresharkPortable-1.4.7.paf.exe)=ddd7bcbafbde2c0f8348ee9fb5245824204823af
RIPEMD160(WiresharkPortable-1.4.7.paf.exe)=dd26e8122c6c25e513a9076468c85e3f91af813b

Wireshark 1.4.7 Intel 32.dmg: 47636681 bytes
MD5(Wireshark 1.4.7 Intel 32.dmg)=45d4b9158527f3447614e4ad5f381044
SHA1(Wireshark 1.4.7 Intel 32.dmg)=830439aed09d7743e8d4a5362e14ffb32ce91365
RIPEMD160(Wireshark 1.4.7 Intel
32.dmg)=780d469581ca0b5c370ed33742cd6680185cd98c

Wireshark 1.4.7 Intel 64.dmg: 44314730 bytes
MD5(Wireshark 1.4.7 Intel 64.dmg)=9be0c60a303d3d92c5def216ff00e631
SHA1(Wireshark 1.4.7 Intel 64.dmg)=79c88f498c1977d7fcc2013f806b70eb45552a33
RIPEMD160(Wireshark 1.4.7 Intel
64.dmg)=abec547fde37db587e84a380887934286ffcca80

Wireshark 1.4.7 PPC 32.dmg: 50167767 bytes
MD5(Wireshark 1.4.7 PPC 32.dmg)=6a266dffe220f9eb025c240b04ce7eb2
SHA1(Wireshark 1.4.7 PPC 32.dmg)=ad092b82f964074436908877de5ef809872c1592
RIPEMD160(Wireshark 1.4.7 PPC
32.dmg)=987ffc13df6b976c3c19f678a3da3593c989c5d1

patch-wireshark-1.4.6-to-1.4.7.diff.bz2: 52462 bytes
MD5(patch-wireshark-1.4.6-to-1.4.7.diff.bz2)=e97c160e1d3dc1c51fec534779dc2d5f
SHA1(patch-wireshark-1.4.6-to-1.4.7.diff.bz2)=477c89b34f4443b00b4ac4bcf39c4a39135f95bf
RIPEMD160(patch-wireshark-1.4.6-to-1.4.7.diff.bz2)=2eaba00ad6fdc05ec242d3f9aa8d93cdddc9af99
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk3lcdMACgkQpw8IXSHylJrhZACdFie+rLBUME+h23jvW2HRT7r8
I0EAn3QPDQnjuHfBZIW8dpc8c6eUdGAp
=X3M3
-----END PGP SIGNATURE-----