Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-dev: [Wireshark-dev] Wireshark 1.12.13 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 27 Jul 2016 13:17:26 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

I'm proud to announce the release of Wireshark 1.12.13.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

   This is the final release of Wireshark 1.12. It officially reaches end
   of life on July 31, 2016. If you are still using Wireshark 1.12 you are
   encouraged to upgrade to Wireshark 2.0.

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2016-40
       NDS dissector crash. ([2]Bug 12576)
     * [3]wnpa-sec-2016-41
       PacketBB crash. ([4]Bug 12577)
     * [5]wnpa-sec-2016-42
       WSP infinite loop. ([6]Bug 12594)
     * [7]wnpa-sec-2016-43
       MMSE infinite loop. ([8]Bug 12624)
     * [9]wnpa-sec-2016-44
       RLC long loop. ([10]Bug 12660)
     * [11]wnpa-sec-2016-45
       LDSS dissector crash. ([12]Bug 12662)
     * [13]wnpa-sec-2016-46
       RLC dissector crash. ([14]Bug 12664)
     * [15]wnpa-sec-2016-47
       OpenFlow long loop. ([16]Bug 12659)

   The following bugs have been fixed:
     * T30 FCF byte decoding masks DTC, CIG and NCS. ([17]Bug 1918)
     * TShark crashes with option "-z io,stat,..." in the presence of
       negative relative packet timestamps. ([18]Bug 9014)
     * Packet size limited during capture msg is repeated in the Info
       column. ([19]Bug 9826)
     * Filter for field name tcp.options.wscale.multiplier cannot exceed
       255. ([20]Bug 12525)
     * Inconsistent VHT data rate. ([21]Bug 12558)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   802.11 Radiotap, LANforge, LDSS, MMSE, PacketBB, PRP, RLC, RTP MIDI,
   T.30, TCP, VITA 49, WiMax RNG-RSP, and WSP

  New and Updated Capture File Support

   and pcapng
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [22]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [23]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([24]Bug 1419)

   The BER dissector might infinitely loop. ([25]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([26]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([27]Bug 2234)

   The 64-bit Windows installer does not support Kerberos decryption.
   ([28]Win64 development page)

   Resolving ([29]Bug 9044) reopens ([30]Bug 3528) so that Wireshark no
   longer automatically decodes gzip data when following a TCP stream.

   Application crash when changing real-time option. ([31]Bug 4035)

   Hex pane display issue after startup. ([32]Bug 4056)

   Packet list rows are oversized. ([33]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([34]Bug 4985)
     __________________________________________________________________

Getting Help

   Community support is available on [35]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [36]the web site.

   Official Wireshark training and certification are available from
   [37]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [38]Wireshark web site.
     __________________________________________________________________

   Last updated 2016-07-27 12:29:36 PDT

References

   1. https://www.wireshark.org/security/wnpa-sec-2016-40.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12576
   3. https://www.wireshark.org/security/wnpa-sec-2016-41.html
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
   5. https://www.wireshark.org/security/wnpa-sec-2016-42.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594
   7. https://www.wireshark.org/security/wnpa-sec-2016-43.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
   9. https://www.wireshark.org/security/wnpa-sec-2016-44.html
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
  11. https://www.wireshark.org/security/wnpa-sec-2016-45.html
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
  13. https://www.wireshark.org/security/wnpa-sec-2016-46.html
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
  15. https://www.wireshark.org/security/wnpa-sec-2016-47.html
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1918
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9014
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9826
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12525
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12558
  22. https://www.wireshark.org/download.html
  23. https://www.wireshark.org/download.html#thirdparty
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  28. https://wiki.wireshark.org/Development/Win64
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  35. https://ask.wireshark.org/
  36. https://www.wireshark.org/lists/
  37. http://www.wiresharktraining.com/
  38. https://www.wireshark.org/faq.html


Digests

wireshark-1.12.13.tar.bz2: 29398804 bytes
SHA256(wireshark-1.12.13.tar.bz2)=7836cdaabd056ab4c9dd19cf0c791f11d980d0f6037542476034f2b7bdcf5d5b
RIPEMD160(wireshark-1.12.13.tar.bz2)=45a46794ae375475597866145aa22984b31bedd6
SHA1(wireshark-1.12.13.tar.bz2)=4a036b67ca1ca99c9061cf3d12d0604a62bc8b8c
MD5(wireshark-1.12.13.tar.bz2)=15af85adc8ba83e6e996e13a55df4fb0

Wireshark-win64-1.12.13.exe: 30000016 bytes
SHA256(Wireshark-win64-1.12.13.exe)=31d5420cbf774961eb22f2b0d7cb74dd03a28fae92ded3386cb13fc6fd579053
RIPEMD160(Wireshark-win64-1.12.13.exe)=3b98d010ad2750654fd8bbae24d76ad7387c940d
SHA1(Wireshark-win64-1.12.13.exe)=1d8eedea8a177016a644ee3fd8a0adaa326c6109
MD5(Wireshark-win64-1.12.13.exe)=39f05a5c5ebd3b183c74e986fb0e30ca

Wireshark-win32-1.12.13.exe: 23765136 bytes
SHA256(Wireshark-win32-1.12.13.exe)=47eb5c4ac48848fdfd5c322491e0320c998f5a2dccebad88af9ed787c1907039
RIPEMD160(Wireshark-win32-1.12.13.exe)=444c5898a58a2c6a90b3f62f146b4e17da945031
SHA1(Wireshark-win32-1.12.13.exe)=f65a13b356136c0a4f39ca94dd8c5393af465df7
MD5(Wireshark-win32-1.12.13.exe)=52853c0ebe373d4a04a5d15134e7e859

WiresharkPortable-1.12.13.paf.exe: 30073440 bytes
SHA256(WiresharkPortable-1.12.13.paf.exe)=689a470fa5e1d922954eea0ba1bd235180c2b8d92b66c3a643e24b4a4cf7605a
RIPEMD160(WiresharkPortable-1.12.13.paf.exe)=60ca4071f1445b9e0c4ae606d23bfe677c621f31
SHA1(WiresharkPortable-1.12.13.paf.exe)=9d0c3011e91e5b269a59592b2cb43899f03a8f4e
MD5(WiresharkPortable-1.12.13.paf.exe)=4d973537801770f10d21cda1e64b8ecb

Wireshark 1.12.13 Intel 32.dmg: 21958686 bytes
SHA256(Wireshark 1.12.13 Intel
32.dmg)=a6e1772b10da9de19bbbb7d1ac3f486606cfad9cdaa58e091a6b0fafabcda411
RIPEMD160(Wireshark 1.12.13 Intel
32.dmg)=4f00e1ff7ee85d10fdb280157524fa6b158306bb
SHA1(Wireshark 1.12.13 Intel 32.dmg)=95157d7a8eecfcf3e7155addd590863585db1039
MD5(Wireshark 1.12.13 Intel 32.dmg)=67b90605a9ac64c6b09e7c3fe9bf6747

Wireshark 1.12.13 Intel 64.dmg: 26539534 bytes
SHA256(Wireshark 1.12.13 Intel
64.dmg)=a26b87ca9f5ac3b4c84250d460f379ddbe85647809d96eae297a9f7810c38dd3
RIPEMD160(Wireshark 1.12.13 Intel
64.dmg)=bf6402fc9a5336ec8b62ae38bddfbdcfd9b3556f
SHA1(Wireshark 1.12.13 Intel 64.dmg)=d3f9a716e2344ccf6b921b00225b19dc54d9d224
MD5(Wireshark 1.12.13 Intel 64.dmg)=90e2d7c60c48de31caba57e66e427469

patch-wireshark-1.12.12-to-1.12.13.bz2: 93835 bytes
SHA256(patch-wireshark-1.12.12-to-1.12.13.bz2)=a714c205a39b78994dff5dcbac58e1a0ab59877dbd7dee2c3fe5ab221a412d53
RIPEMD160(patch-wireshark-1.12.12-to-1.12.13.bz2)=39bd18cdcea8a8e3ab4c118a50ccf69119ce5f19
SHA1(patch-wireshark-1.12.12-to-1.12.13.bz2)=81b24071262451a716049223c9d876fdf2495f58
MD5(patch-wireshark-1.12.12-to-1.12.13.bz2)=6ee788e18e5746551b3b95c0ed07db32
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCgAGBQJXmRbWAAoJEIIkSnjm/q7qGrQP/2wGm0Su3iXpiBR22cQqElfw
jeXpvX3h4LwX79PAgjrXEY3cTBRO7I8KDW2j4+m8jmdmW1H48b4KQjU/PkKgomXr
zYCCW1VUzM2y4DHcmxZ1aKs/VRh4VyvvpRnQkF6yr9GJ1SdU/PfDFWeWMtqTG0U7
jCB737RT+IZdfjtJFBJuYMfpThgWAE88QEJOF5tTM3n0rBmAFNAIuqougNLOXSda
Cjp3unSmA/b34Kbe6i6HD5Ip1RmwardPzg2dVG4jgEo/r4QUd7fJ0I4Fb13EpWWZ
jQUw3Q7cz0TylprznWOkzmzSj5pEOXomiXm47scwPxVjRWDQM5a75Xs/uXMPjiZf
Hhdu4C7bfs9shvnfW3BExb0rMbb1zvSbjfaZMycN9Cc8+QSJbEAUDd8FZyfY5STQ
NfQP9UWRVn/vwmQhpsP1Wy70qzOL15C0x0i+SBuNE+d++RG8spuKXlKQkR9obF4U
5+VAvJ20kwWCBYOGFWmAGj+xtLnmwkGeWgINv9L1+vjZLlgbDMkjcu2qP05U3J+a
W7X0nD9Xo0blXkQZJuUrwjrwcEBeIkmNU6NDVTIjJmnneeYAtdF5gf+OWhwUSUPY
j+0Sn+sjIAtKsifGN8vabCSwdk+VWq1nza/qGu6i68oNrn17XldLvfWQuhgk2QjR
PaXkygQamLc3XQVvgEsd
=t1dd
-----END PGP SIGNATURE-----