Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-dev: [Wireshark-dev] Wireshark 0.99.6 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 05 Jul 2007 14:51:36 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Wireshark 0.99.6 has been released.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development, and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed. See the security
   advisory for details and a workaround.

     o Wireshark could crash when dissecting an HTTP chunked
       response. (Bug 1394)

       Versions affected: 0.99.5

     o On some systems, Wireshark could crash while reading iSeries
       capture files. (Bug 1415)

       Versions affected: 0.10.14 to 0.99.5

     o Wireshark could exhaust system memory while reading a
       malformed DCP ETSI packet. (Bug 1264)

       Versions affected: 0.99.5

     o Wireshark could loop excessively while reading a malformed SSL
       packet. (Bug 1582)

       Versions affected: 0.8.20 to 0.99.5

     o The DHCP/BOOTP dissector was susceptible to an off-by-one
       error. (Bug 1416)

       Versions affected: 0.10.17 to 0.99.5

     o Wireshark could loop excessively while reading a malformed MMS
       packet. (Bug 1342)

       Versions affected: 0.10.12 to 0.99.5

   The following bugs have been fixed:

     o WEP decryption would only work for the first key specified.
       disappear or become unusable. WEP and WPA decryption didn't
       work for QoS frames. WPA decryption failed if EAPOL handshake
       packets contained extra data. Wireshark failed to parse
       colon-separated WEP keys.

     o Merging files in Wireshark now appends files properly.

     o Wireshark could hang while saving an RTP stream with bad
       timestamp data.

     o You must now explicitly pass "--disable-wireshark" to the
       build environment if you only want to build TShark; the
       configure script will fail, rather than automatically building
       only TShark, if it's run on a system that doesn't have GTK+
       headers and libraries installed.

     o Capture from named pipes (via -i \\<server>\pipe\<pipename>)
       now works under Windows.

     o The frame.time_delta display filter now works as expected,
       matching the delta time between the current and previous
       captured packet. A new filter, frame.time_delta_displayed,
       matches the delta time between the current and previous
       displayed packet.

  New and Updated Features

   The following features are new (or have been significantly
   updated) since the last release:

     o You no longer have to restart Wireshark after changing column
       preferences. Woohoo!

     o You can now export HTTP objects via
       File->Export->Objects->HTTP.

     o Display filter macros are now supported.

     o Right-clicking on a packet lets you copy many more things,
       such as the packet summary and the packet bytes.

     o You can now match upper- and lower-case text with the contains
       operator, e.g. upper(http.request.method) contains "GET".

     o A great deal of code has been cleaned up, including fixing
       many compiler errors. Many thanks to those who worked on this.

  New Protocol Support

   AMQP (Advanced Message Queueing Protocol), BCTP Q.1990, Borland
   StarTeam, Cisco ERSPAN, CTDB (Cluster TDB), DRDA (Distributed
   Relational Database Architecture), DTPT (DeskTop PassThrough),
   EPMD (Erlang Port Mapper Daemon), FCoE (Fibre Channel over
   Ethernet), Firebird/Interbase (replaces the old Interbase
   dissector), FMP (File Mapping Protocol), H.248.10, H.248.7,
   IPsec/ISAKMP over TCP, Kingfisher, MIKEY (Multimedia Internet
   KEYing), MPEG, NSRP (Juniper Netscreen Redundant Protocol), OpcUa
   Binary Protocol, PPI (Per-Packet Information header), Q.932, QSIG,
   TAPA (Trapeze Access Point Access Protocol), WiMAX, WiMAX M2M

  Updated Protocol Support

   ACSE, AFP, AMR, ANSI IS-801, ANSI MAP, ARP, ASAP, ASN.1 BER, ASN.1
   PER, AVS WLANCAP, BSSAP, BSSGP, BVLC, Camel, CDT, CIP, CMS, COPS,
   CPFI, DCCP, DCERPC (DCERPC, ATSVC, DFS, EFS, EVENTLOG,
   INITSHUTDOWN, NDR, NETLOGON, NSPI, NT, PNIO, SAMR, SPOOLSS,
   SRVSVC, WINREG, WKSSVC, WZCSVC), DCOM (DCOM, CBA, CBA-ACCO), DCP
   ETSI, DCP, DCT2000, DHCP, DIAMETER, DMP, DNP, DTLS, EDP, ENRP,
   EPL, ERF, FCELS, Fibre Channel, FTAM, FTBP, FW-1, GIOP, GSM MAP,
   GTP, H.223, H.225, H.235, H.245, H.248, H.263, HTTP, IAX2, IEEE
   802.11, IGRP, INAP, IP, IPsec, IPv6, iSCSI, ISUP, IUA, IuUP,
   Juniper, JXTA, K12, Kerberos, L2TP, LDAP, LLDP, LWAPP, M3UA,
   MEGACO, MIP, MMS, MP2T, MTP3, NBAP, NDMP, Netflow, NFS, NT SONMP,
   OICQ, OSPF, PANA, PN-PTCP, PPP, P_Mul, Radiotap, RADIUS
   (Packetcable), RANAP, Redback, RNSAP, RRLP, RSVP, RTCP, RTP, RX,
   SCCP, SCSI (SCSI, MMC, OSD, SBC, SMC, SSC), SCTP, SDP, SIGCOMP,
   SIP, Skinny, SliMP3, SLL, SMB PIPE, SMB, SMB2, SMPP, SNMP, SPNEGO,
   SSCOP, SSL, STUN, SUA, Symantec, Syslog, TACACS, TCAP, TCP, TFTP,
   UDLD, UDP, ULP, UMA, UMTS (UMTS, FP, RRC), USB, VNC, WCP, WLCCP,
   X.25, X.411, X.509, YMSG

  New and Updated Capture File Support

   DCT2000, Endace ERF, iSeries, K12, MPEG Audio (yes, this means you
   can open .mp3 files in Wireshark), NetMon, pppdump, snoop (Shomiti
   wireless packets), Visual Networks, Windows Sniffer (NetXRay)

Getting Wireshark

  The source code and Windows installer can be downloaded immediately
  from http://www.wireshark.org/download/ .

Digests

wireshark-0.99.6.tar.bz2: 11826043 bytes
MD5(wireshark-0.99.6.tar.bz2)=e57a8c8b364c38df3da97e2ee9f0d0bc
SHA1(wireshark-0.99.6.tar.bz2)=91f57158a75adca36c79c35525eb3cf57b927075
RIPEMD160(wireshark-0.99.6.tar.bz2)=7c69e71e54d521d942bcbad9894547d9785f0948

wireshark-0.99.6.tar.gz: 15004582 bytes
MD5(wireshark-0.99.6.tar.gz)=d9c723032c424b3a210a0426167e9732
SHA1(wireshark-0.99.6.tar.gz)=1c31609ca3ce12f259d56390b143b58a22a43596
RIPEMD160(wireshark-0.99.6.tar.gz)=f16d319255a23447e29bd783a4aa802f1b3165d3

wireshark-setup-0.99.6.exe: 18328685 bytes
MD5(wireshark-setup-0.99.6.exe)=e5ad8e47ce5360393d1c57fe807abe67
SHA1(wireshark-setup-0.99.6.exe)=e8e1176c1d398654327dc2f59ddcb189794621cf
RIPEMD160(wireshark-setup-0.99.6.exe)=8c59b69bf65bde52f84e857c7998c27a69563061

wireshark-0.99.6.u3p: 24754395 bytes
MD5(wireshark-0.99.6.u3p)=99352129653953381292f0e2855c2f59
SHA1(wireshark-0.99.6.u3p)=3e4ebda2acbe3423912689b1ee71ea6fdc3035ca
RIPEMD160(wireshark-0.99.6.u3p)=f55fba85f39cde9b4957164cad7e35fc1647df6b

patch-wireshark-0.99.5-to-0.99.6.diff.bz2: 5490241 bytes
MD5(patch-wireshark-0.99.5-to-0.99.6.diff.bz2)=45cb1b6e5492e717393754476a0b8bff
SHA1(patch-wireshark-0.99.5-to-0.99.6.diff.bz2)=ad6feadb96fd0959993d40374a341b160004e349
RIPEMD160(patch-wireshark-0.99.5-to-0.99.6.diff.bz2)=5fb29ba815bfa0944a1d70236ea63ff67a297216

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGjWflpw8IXSHylJoRAtgEAJ9R2TG2vDGcXIA6CvIQjh6hOCIxPwCgyvdt
D7VoEpYRzjQKXKBaSUaI2Pw=
=u7Ah
-----END PGP SIGNATURE-----