ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-users: [Wireshark-users] Wireshark 1.0.4 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Mon, 20 Oct 2008 16:56:31 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.0.4.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development, and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed. See the security
   advisory for details and a workaround.

     o Florent Drouin and David Maciejak found that the Bluetooth ACL
       dissector could crash or abort. (Bug 1513)

       Versions affected: 0.99.2 to 1.0.3

     o The Q.931 dissector could crash or abort. (Bug 2870)

       Versions affected: 0.10.3 to 1.0.3

     o Wireshark could abort while reading Tamos CommView capture
       files. (Bug 2926)

       Versions affected: 0.99.7 to 1.0.3

     o David Maciejak found that the USB dissector could crash or
       abort. This led to the disovery of a similar problem in the
       Bluetooth RFCOMM dissector. (Bug 2922)

       Versions affected: 0.99.7 to 1.0.3

     o Vivek Gupta and David Maciejak found that the PRP and MATE
       dissectors could make Wireshark crash. (Neither PRP nor MATE
       are enabled by default.) (Bug 2549)

       Versions affected: 0.99.2 to 1.0.3

   The following bugs have been fixed:

     o Let MP2T call its subdissectors, even without tree (Bug 2627)

     o Wireless Toolbar not enabled (using AirPcap) if PCAP_REMOTE=1
       (Bug 2685)

     o Failure to dissect long SASL wrapped LDAP response (Bug 2687)

     o Fix compiler warnings (Bug 2823)

     o Homeplug dissection bugs (Bug 2859)

     o Malformed Packet DCP ETSI error (Bug 2860)

     o Wrong size of selected_registrar in WPS dissector (Bug 2865)

     o Dissector assertion displaying cookies in DTLS frames (Bug
       2876)

     o Missing field type in documentation (Bug 2889)

     o Wireshark -p switch seems to have no effect to PROMISCUOUS
       mode (Bug 2891)

     o Misspelled PPI error vector magnitude filter (Bug 2903)

     o Modbus Function 43 Encapsulated Interface Transport decoding
       (Bug 2917)

     o Crash when printing or exporting some protocol data (Bug 2934)

     o Crash when selecting "Export Selected Packet Bytes" (Bug 2964)

  New and Updated Features

   There are no new or updated features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   AFP, Bluetooth ACL, Bluetooth RFCOMM, DCP ETSI, DTLS, Homeplug,
   IEEE 802.11, IP, Modbus TCP, MP2T, NSIP, NCP, PPI, Q.931, SASL,
   SNMP, USB, WPS

  New and Updated Capture File Support

   AiroPeek, CommView

Getting Wireshark

   Wireshark source code and installation packages are available from
   the download page on the main web site.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.

Known Problems

   Wireshark may appear offscreen on multi-monitor Windows systems.
   (Bug 553)

   Wireshark might make your system disassociate from a wireless
   network on OS X. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Wireshark can't dynamically update the packet list. This means
   that host name resolutions above a certain response time threshold
   won't show up in the packet list. (Bug 1605)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Wireshark might freeze when reading from a pipe. (Bug 2082)

   Capturing from named pipes might be delayed on Windows. (Bug 2200)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

Getting Help

   Community support is available on the wireshark-users mailing
   list. Subscription information and archives for all of Wireshark's
   mailing lists can be found on the web site.

   Commercial support and development services are available from
   CACE Technologies.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.0.4.tar.bz2: 13126757 bytes
MD5(wireshark-1.0.4.tar.bz2)=cc67730ccddcc5bc6f111c836ba78435
SHA1(wireshark-1.0.4.tar.bz2)=8e75a6d909a1da803db77f6f86fdd5096e5bbac8
RIPEMD160(wireshark-1.0.4.tar.bz2)=741b6618ba34b55079f15d5725a1e9a22a4fc351

wireshark-1.0.4.tar.gz: 16834032 bytes
MD5(wireshark-1.0.4.tar.gz)=893f838aa8ac3da0cf0fea7a61fc4318
SHA1(wireshark-1.0.4.tar.gz)=d039283b7eae150892aa5522320e971909248ab2
RIPEMD160(wireshark-1.0.4.tar.gz)=e229ed697928ad863d6b5026e4e41df49484ec8a

wireshark-setup-1.0.4.exe: 22238802 bytes
MD5(wireshark-setup-1.0.4.exe)=73052e2c7445bcc97378a1936710d345
SHA1(wireshark-setup-1.0.4.exe)=dd586df3c287e6f0da160cf7c0fc1e317a091abe
RIPEMD160(wireshark-setup-1.0.4.exe)=3e00c74c91fe66c485632c8e76d03232fcdcb4c1

wireshark-1.0.4.u3p: 20105103 bytes
MD5(wireshark-1.0.4.u3p)=9ecdf47b6295c2934e4afea5bb5296d7
SHA1(wireshark-1.0.4.u3p)=af0aaebb0113478510e5138cb70cfa0a6c5d0829
RIPEMD160(wireshark-1.0.4.u3p)=01d3e1e71fa831d764ee89f3fa88c1524ccf3821

WiresharkPortable-1.0.4.paf.exe: 17538656 bytes
MD5(WiresharkPortable-1.0.4.paf.exe)=69b4e3455dbdc8663b86579f5cb1ced3
SHA1(WiresharkPortable-1.0.4.paf.exe)=bbdc78c53637caa31e34a2991493af94304e270d
RIPEMD160(WiresharkPortable-1.0.4.paf.exe)=c67cbf2bd9a119b315375251cf6095f68c78766b

Wireshark 1.0.4 Intel.dmg: 35897944 bytes
MD5(Wireshark 1.0.4 Intel.dmg)=c063abaae67aaf9e8ad9fca320a2e930
SHA1(Wireshark 1.0.4 Intel.dmg)=d76280fd4203cd24f90f069ad6aa75dc2d82f1c5
RIPEMD160(Wireshark 1.0.4 Intel.dmg)=c8e00cd430473b961c7f15953e3518c1e673572d

patch-wireshark-1.0.3-to-1.0.4.diff.bz2: 90689 bytes
MD5(patch-wireshark-1.0.3-to-1.0.4.diff.bz2)=dc40eb2e10847ff1b7dc80ad827e5ad2
SHA1(patch-wireshark-1.0.3-to-1.0.4.diff.bz2)=065e98f477d0c161b97a270b618f049c0c9877a8
RIPEMD160(patch-wireshark-1.0.3-to-1.0.4.diff.bz2)=76d6ecb30f280a89b54f8271488b4d964dea52d0
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)

iEYEARECAAYFAkj9GqwACgkQpw8IXSHylJo0QACfUrYsUgTrpYdJoNjwN9+ek905
aB8An0+P8se+YBDLag4HnKO4tFkHF3fM
=kQLW
-----END PGP SIGNATURE-----