Wireshark-announce: [Wireshark-announce] Wireshark 1.12.2 is now available
Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <[email protected]>
Date: Wed, 12 Nov 2014 12:33:07 -0800
Hash: SHA1

I'm proud to announce the release of Wireshark 1.12.2.


What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2014-20
       SigComp UDVM buffer overflow. ([2]Bug 10662)
     * [4]wnpa-sec-2014-21
       AMQP crash. ([5]Bug 10582) [6]CVE-2014-8711
     * [7]wnpa-sec-2014-22
       NCP crashes. ([8]Bug 10552, [9]Bug 10628) [10]CVE-2014-8712
     * [12]wnpa-sec-2014-23
       TN5250 infinite loops. ([13]Bug 10596) [14]CVE-2014-8714

   The following bugs have been fixed:
     * Wireshark determine packets of MMS protocol as a packets of
       T.125 protocol. ([15]Bug 10350)
     * 6LoWPAN Mesh headers not treated as encapsulating address.
       ([16]Bug 10462)
     * UCP dissector bug of operation 31 - PID 0639 not
       recognized. ([17]Bug 10463)
     * iSCSI dissector rejects PDUs with "expected data transfer
       length" > 16M. ([18]Bug 10469)
     * GTPv2: trigging_tree under Trace information has wrong
       length. ([19]Bug 10470)
     * openflow_v1 OFPT_FEATURES_REPLY parsed incorrectly.
       ([20]Bug 10493)
     * Capture files from a remote virtual interface on MacOS X
       10.9.5 aren't dissected correctly. ([21]Bug 10502)
     * Problem specifying protocol name for filtering. ([22]Bug
     * LLDP TIA Network Policy Unknown Policy Flag Decode is not
       correct. ([23]Bug 10512)
     * Decryption of DCERPC with Kerberos encryption fails.
       ([24]Bug 10538)
     * Dissection of DECRPC NT sid28 shouldn't show expert info if
       tree is null. ([25]Bug 10542)
     * Attempt to render an SMS-DELIVER-REPORT instead of an
       SMS-DELIVER. ([26]Bug 10547)
     * IPv6 Calipso option length is not used properly. ([27]Bug
     * The SPDY dissector couldn't dissecting packet correctly.
       ([28]Bug 10566)
     * IPv6 QuickStart option Nonce is read incorrectly. ([29]Bug
     * IPv6 Mobility Option IPv6 Address/Prefix marks too many
       bytes for the address/prefix field. ([30]Bug 10576)
     * IPv6 Mobility Option Binding Authorization Data for FMIPv6
       Authenticator field is read beyond the option data.
       ([31]Bug 10577)
     * IPv6 Mobility Option Mobile Node Link Layer Identifier
       Link-layer Identifier field is read beyond the option data.
       ([32]Bug 10578)
     * Wrong offset for hf_mq_id_icf1 in packet-mq.c. ([33]Bug
     * Malformed PTPoE announce packet. ([34]Bug 10611)
     * IPv6 Permanent Home Keygen Token mobility option includes
       too many bytes for the token field. ([35]Bug 10619)
     * IPv6 Redirect Mobility Option K and N bits are parsed
       incorrectly. ([36]Bug 10622)
     * IPv6 Care Of Test mobility option includes too many bytes
       for the Keygen Token field. ([37]Bug 10624)
     * IPv6 MESG-ID mobility option is parsed incorrectly.
       ([38]Bug 10625)
     * IPv6 AUTH mobility option parses Mobility SPI and
       Authentication Data incorrectly. ([39]Bug 10626)
     * IPv6 DNS-UPDATE-TYPE mobility option includes too many
       bytes for the MD identity field. ([40]Bug 10629)
     * IPv6 Local Mobility Anchor Address mobility option's code
       and reserved fields are parsed as 2 bytes instead of 1.
       ([41]Bug 10630)
     * WCCP v.2.01 extended assignment data element parsed wrong.
       ([42]Bug 10641)
     * DNS ISDN RR Sub Address field is read one byte early.
       ([43]Bug 10650)
     * TShark crashes when running with PDML on a specific packet.
       ([44]Bug 10651)
     * DNS A6 Address Suffix field is parsed incorrectly. ([45]Bug
     * DNS response time: calculation incorrect. ([46]Bug 10657)
     * SMPP does not display properly the hour field in the
       Submit_sm Validity Period field. ([47]Bug 10672)
     * DNS Name Length for Zone RR on root is 6 and Label Count is
       1. ([48]Bug 10674)
     * DNS WKS RR Protocol field is read as 4 bytes instead of 1.
       ([49]Bug 10675)
     * IPv6 Mobility Option Context Request reads an extra
       request. ([50]Bug 10676)

  New and Updated Features

   There are no new features in this release.

   The Windows installers no longer include previews of Wireshark
   2. If you want to try the new user interface, please download a
   development (1.99) installer.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   6LoWPAN, AMQP, ANSI IS-637-A, Bluetooth HCI, CoAP, DCERPC
   (all), DCERPC NT, DNS, GSM MAP, GTPv2, H.223, HPSW, HTTP2, IEEE
   802.11, IPv6, iSCSI, Kerberos, LBT-RM, LLDP, MIH, Mobile IPv6,
   MQ, NCP, OpcUa, OpenFlow, PKTAP, PTPoE, SigComp, SMB2, SMPP,
   SPDY, Stanag 4607, T.125, UCP, USB CCID, and WCCP

  New and Updated Capture File Support

   Catapult DCT2000, HP-UX nettl, Ixia IxVeriWave, pcap, pcap-ng,
   RADCOM, and Sniffer (DOS)

Getting Wireshark

   Wireshark source code and installation packages are available
   from [51]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [52]download page
   on the Wireshark web site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([53]Bug

   The BER dissector might infinitely loop. ([54]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([55]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([56]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([57]Win64 development page)

   Resolving ([58]Bug 9044) reopens ([59]Bug 3528) so that
   Wireshark no longer automatically decodes gzip data when
   following a TCP stream.

   Application crash when changing real-time option. ([60]Bug

   Hex pane display issue after startup. ([61]Bug 4056)

   Packet list rows are oversized. ([62]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([63]Bug 4985)

Getting Help

   Community support is available on [64]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [65]the web site.

   Official Wireshark training and certification are available
   from [66]Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the [67]Wireshark web site.

   Last updated 2014-11-12 12:31:46 PST


   1. https://www.wireshark.org/security/wnpa-sec-2014-20.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10662
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710
   4. https://www.wireshark.org/security/wnpa-sec-2014-21.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10582
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711
   7. https://www.wireshark.org/security/wnpa-sec-2014-22.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10552
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10628
  10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712
  11. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713
  12. https://www.wireshark.org/security/wnpa-sec-2014-23.html
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10596
  14. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10350
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10462
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10463
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10469
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10470
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10493
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10502
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10509
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10512
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10538
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10542
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10547
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10561
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10566
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10575
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10576
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10577
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10578
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10597
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10611
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10619
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10622
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10624
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10625
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10626
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10629
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10630
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10641
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10650
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10651
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10652
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10657
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10672
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10674
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10675
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10676
  51. http://www.wireshark.org/download.html
  52. http://www.wireshark.org/download.html#thirdparty
  53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  57. http://wiki.wireshark.org/Development/Win64
  58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  64. http://ask.wireshark.org/
  65. http://www.wireshark.org/lists/
  66. http://www.wiresharktraining.com/
  67. http://www.wireshark.org/faq.html


wireshark-1.12.2.tar.bz2: 29138867 bytes

Wireshark-win64-1.12.2.exe: 29812640 bytes

Wireshark-win32-1.12.2.exe: 23571488 bytes

WiresharkPortable-1.12.2.paf.exe: 29863288 bytes

Wireshark 1.12.2 Intel 32.dmg: 21804829 bytes
MD5(Wireshark 1.12.2 Intel 32.dmg)=083aa56cfe320662b0c45a7223b585a4
SHA1(Wireshark 1.12.2 Intel
RIPEMD160(Wireshark 1.12.2 Intel

Wireshark 1.12.2 Intel 64.dmg: 26375047 bytes
MD5(Wireshark 1.12.2 Intel 64.dmg)=f7ee521f0103bc088d221f7a3329b54f
SHA1(Wireshark 1.12.2 Intel
RIPEMD160(Wireshark 1.12.2 Intel

patch-wireshark-1.12.1-to-1.12.2.bz2: 260965 bytes
Version: GnuPG v1