Wireshark-announce: [Wireshark-announce] Wireshark 3.2.1 is now available
Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <[email protected]>
Date: Wed, 15 Jan 2020 12:05:12 -0800
I'm proud to announce the release of Wireshark 3.2.1.

 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

    • The Windows installers now ship with Npcap 0.9986. They previously
      shipped with Npcap 0.9984.

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2020-01[1] WASSP dissector crash. Bug 16324[2].

   The following bugs have been fixed:

     • Incorrect parsing of USB CDC packets. Bug 14587[4].

     • Wireshark fails to create directory if parent directory does not
       yet exist. Bug 16143[5].

     • Buildbot crash output: randpkt-2019-11-30-22633.pcap. Bug

     • Closing Flow Graph closes (crashes) main GUI window. Bug

     • Wireshark interprets websocket frames after HTTP handshake in a
       wrong way. Bug 16274[8].

     • A-bis/OML: IPA Destination IP Address attribute contains inverted
       value (endianness). Bug 16282[9].

     • wiretap/log3gpp.c: 2 * leap before looking ?. Bug 16283[10].

     • Opening shell terminal prints Wireshark: Permission denied. Bug

     • h264: SPS frame_crop_right_offset shown in UI as
       frame_crop_left_offset. Bug 16285[12].

     • BGP: update of "Sub-TLV Length" by draft-ietf-idr-tunnel-encaps.
       Bug 16294[13].

     • SPNEGO+GSS-API+Kerberos+ap-options dissection produces "Unknown
       Bit(s)" expert message. Bug 16301[14].

     • USB Audio feature unit descriptor is incorrectly dissected. Bug

     • Compiling the .y files fails with Berkeley YACC. Bug 16306[16].

     • PDB files in Windows installer. Bug 16307[17].

     • NAS-5GS 5GS network feature support lacks MCSI, EMCN3 two fields
       (octet 4). Bug 16310[18].

     • Option to change “Packet List” columns header right click pop-up
       menu behavior. Bug 16317[19].

     • DLT: Dissector does not parse multiple DLT messages in single UDP
       packet. Bug 16321[20].

     • ISAKMP Dissection: Enhance Source id and Destination ID field of
       GDOI SA TEK payload for non IP ID type. Bug 16233[21].

     • DOIP: Typo in "identifcation request messages". Bug 16325[22].

     • Toolbar "?" help button - no text/help displayed. Bug 16327[23].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   802.11 Radiotap, ASN.1 BER, BGP, DLT, DOIP, GSM A RR, GSM A-bis/OML,
   H264, HTTP, IEC 60870-5-104, IEEE 802.11, IPv4, ISAKMP, NAS 5GS,
   rtnetlink, SIP, TIPC, USB Audio, USB CDC, and WASSP

  New and Updated Capture File Support

   3gpp phone log

 Getting Wireshark

  Wireshark source code and installation packages are available from

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[24] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About→Folders to
  find the default locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[25] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[26].

  Bugs and feature requests can be reported on the bug tracker[27].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[28].

  Last updated 2020-01-15 18:13:27 UTC


   1. https://www.wireshark.org/security/wnpa-sec-2020-01
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16324
   3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14587
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16143
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16240
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16260
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16274
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16282
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16283
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16284
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16285
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16294
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16301
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16305
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16306
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16307
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16310
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16317
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16321
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16233
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16325
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16327
  24. https://www.wireshark.org/download.html#thirdparty
  25. https://ask.wireshark.org/
  26. https://www.wireshark.org/lists/
  27. https://bugs.wireshark.org/
  28. https://www.wireshark.org/faq.html


wireshark-3.2.1.tar.xz: 31522124 bytes

Wireshark-win64-3.2.1.exe: 60054504 bytes

Wireshark-win32-3.2.1.exe: 54755072 bytes

Wireshark-win32-3.2.1.msi: 42926080 bytes

Wireshark-win64-3.2.1.msi: 48230400 bytes

WiresharkPortable_3.2.1.paf.exe: 36534000 bytes

Wireshark 3.2.1 Intel 64.dmg: 96254431 bytes
SHA256(Wireshark 3.2.1 Intel 64.dmg)=a1b08841676b626e3dee42274ad321b90c31eccda6808c59ee5ea644e3782cb4
RIPEMD160(Wireshark 3.2.1 Intel 64.dmg)=a4e88414580b29563dd0b44cc2acb0132d9f315f
SHA1(Wireshark 3.2.1 Intel 64.dmg)=1b43fedae40e99006508476927357df203e88f10

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: signature.asc
Description: OpenPGP digital signature