ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-users: [Wireshark-users] Wireshark 1.6.2 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 08 Sep 2011 10:38:57 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.6.2.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.

     o wnpa-sec-2011-12

       A large loop in the OpenSafety dissector could cause a crash.
       (Bug 6138)

       Versions affected: 1.6.0 to 1.6.1.

     o wnpa-sec-2011-13

       A malformed IKE packet could consume excessive resources.

       Versions affected: 1.4.0 to 1.4.8, 1.6.0 to 1.6.1.

       CVE-2011-3266

     o wnpa-sec-2011-14

       A malformed capture file could result in an invalid root
       tvbuff and cause a crash. (Bug 6135)

       Versions affected: 1.6.0 to 1.6.1.

     o wnpa-sec-2011-15

       Wireshark could run arbitrary Lua scripts. (Bug 6136)

       Versions affected: 1.4.0 to 1.4.8, 1.6.0 to 1.6.1.

     o wnpa-sec-2011-16

       The CSN.1 dissector could crash. (Bug 6139)

       Versions affected: 1.6.0 to 1.6.1.

   The following bugs have been fixed:

     o configure ignores (partially) LDFLAGS. (Bug 5607)

     o Build fails when it tries to #include <getopt.h>, not present
       in Solaris 9. (Bug 5608)

     o Unable to configure zero length SNMP Engine ID. (Bug 5731)

     o BACnet who-is request device range values are not decoded
       correctly in the packet details window. (Bug 5769)

     o H.323 RAS packets missing from packet counts in
       "Telephony->VoIP Calls" and the "Flow Graph" for the call.
       (Bug 5848)

     o Wireshark crashes if sercosiii module isn't installed. (Bug
       6006)

     o Editcap could create invalid pcap files when converting from
       JPEG. (Bug 6010)

     o Timestamp is incorrectly decoded for ICMP Timestamp Response
       packets from MS Windows. (Bug 6114)

     o Malformed Packet in decode for BGP-AD update. (Bug 6122)

     o Wrong display of CSN_BIT in CSN.1. (Bug 6151)

     o Fix CSN_RECURSIVE_TARRAY last bit error in packet-csn1.c. (Bug
       6166)

     o Wireshark cannot display Reachable time & Retrans timer in
       IPv6 RA messages. (Bug 6168)

     o ReadPropertyMultiple-ACK not correctly dissected. (Bug 6178)

     o GTPv2 dissectors should treat gtpv2_ccrsi as optional. (Bug
       6183)

     o BGP : AS_PATH attribute was decode wrong. (Bug 6188)

     o Fixes for SCPS TCP option. (Bug 6194)

     o Offset calculated incorrectly for sFlow extended data. (Bug
       6219)

     o [Enter] key behavior varies when manually typing display
       filters. (Bug 6228)

     o Contents of pcapng EnhancedPacketBlocks with comments aren't
       displayed. (Bug 6229)

     o Misdecoding 3G Neighbour Cell Information Element in SI2quater
       message due to a coding typo. (Bug 6237)

     o Mis-spelled word "unknown" in assorted files. (Bug 6244)

     o tshark run with -Tpdml makes a seg fault. (Bug 6245)

     o btl2cap extended window shows wrong bit. (Bug 6257)

     o NDMP dissector incorrectly represents
       "ndmp.bytes_left_to_read" as signed. (Bug 6262)

     o TShark/dumpcap skips capture duration flag occasionally. (Bug
       6280)

     o File types with no snaplen written out with a zero snaplen in
       pcap-ng files. (Bug 6289)

     o Wireshark improperly parsing 802.11 Beacon Country Information
       tag. (Bug 6264)

     o ERF records with extension headers not written out correctly
       to pcap or pcap-ng files. (Bug 6265)

     o RTPS2: MAX_BITMAP_SIZE is defined incorrectly. (Bug 6276)

     o Copying from RTP stream analysis copies 1st line many times.
       (Bug 6279)

     o Wrong display of CSN_BIT under CSN_UNION. (Bug 6287)

     o MEGACO context tracking fix - context id reuse. (Bug 6311)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   BACapp, Bluetooth L2CAP, CSN.1, DCERPC, GSM A RR, GTPv2, ICMP,
   ICMPv6, IKE, MEGACO, MSISDN, NDMP, OpenSafety, RTPS2, sFlow, SNMP,
   TCP

  New and Updated Capture File Support

   CommView, pcap-ng, JPEG.

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About→Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with libsmi. (Win64
   development page)

   Application crash when changing real-time option. (Bug 4035)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. (Bug 4985 and bug 5580)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.6.2.tar.bz2: 21408664 bytes
MD5(wireshark-1.6.2.tar.bz2)=301677b5f8150265315632fb6247e06e
SHA1(wireshark-1.6.2.tar.bz2)=a18d4e8eaf56fe0214b19d7fde0eb91a06817a49
RIPEMD160(wireshark-1.6.2.tar.bz2)=e343d9bb5600b236dea708bb68ecad805a9ee20a

wireshark-win32-1.6.2.exe: 19541182 bytes
MD5(wireshark-win32-1.6.2.exe)=5ffb960a72184f50b18adfe0c0478512
SHA1(wireshark-win32-1.6.2.exe)=3534b3bd8120d8205c07fe3190ec4a6701155a6f
RIPEMD160(wireshark-win32-1.6.2.exe)=4eb5cd91ea533617c92f68758722215b99bc990e

wireshark-win64-1.6.2.exe: 22735486 bytes
MD5(wireshark-win64-1.6.2.exe)=8f246289bd3f5da3cf7dda89f6ee3c8d
SHA1(wireshark-win64-1.6.2.exe)=99ccb2b13eced5adc95726728afdbca00cb54c4b
RIPEMD160(wireshark-win64-1.6.2.exe)=f0fc413570ce561e527249907da8da4d01525251

wireshark-1.6.2.u3p: 26018896 bytes
MD5(wireshark-1.6.2.u3p)=d75e52f038adbcf934ae69e9fb4b4ca9
SHA1(wireshark-1.6.2.u3p)=5a1173cc75901ec258a08b04d32c573cc4457b50
RIPEMD160(wireshark-1.6.2.u3p)=96e3b2143bf205712a2bc583c703df7a57fd786c

WiresharkPortable-1.6.2.paf.exe: 20441315 bytes
MD5(WiresharkPortable-1.6.2.paf.exe)=4989479a02050c9c1c5b7e23648a9ed3
SHA1(WiresharkPortable-1.6.2.paf.exe)=48c1483d68a5e9a5de3b6c7ca375c73e73790b11
RIPEMD160(WiresharkPortable-1.6.2.paf.exe)=6db38217f801e5a2dfa29d6d90715e709e4a2910

Wireshark 1.6.2 Intel 32.dmg: 20416299 bytes
MD5(Wireshark 1.6.2 Intel 32.dmg)=40f725e5342f39f80171cf8bad959f02
SHA1(Wireshark 1.6.2 Intel 32.dmg)=48ba95c9ac438a19b819406f47e31b3080c33ff5
RIPEMD160(Wireshark 1.6.2 Intel
32.dmg)=b2a7331eb0b3a9a7d86295261d5234693b51da67

Wireshark 1.6.2 Intel 64.dmg: 19961860 bytes
MD5(Wireshark 1.6.2 Intel 64.dmg)=32f691b3749b1747d215704103892559
SHA1(Wireshark 1.6.2 Intel 64.dmg)=d0d4f4621d975ab0d8e04dc290909743415ccb0d
RIPEMD160(Wireshark 1.6.2 Intel
64.dmg)=a8a5094c5e762e1c38298fb8d3ba267d7568d304

Wireshark 1.6.2 PPC 32.dmg: 21117047 bytes
MD5(Wireshark 1.6.2 PPC 32.dmg)=f135c38e7d24d8efa9c616ab4a613f8b
SHA1(Wireshark 1.6.2 PPC 32.dmg)=8a66f59088080b9a3a958603ef8bbf83ce27cdf3
RIPEMD160(Wireshark 1.6.2 PPC
32.dmg)=8477a5f7379f0aacc5c479ec7fe38cdbd417bf31

patch-wireshark-1.6.1-to-1.6.2.diff.bz2: 649149 bytes
MD5(patch-wireshark-1.6.1-to-1.6.2.diff.bz2)=d60873a040dfa9f1b6fb0083e89c193c
SHA1(patch-wireshark-1.6.1-to-1.6.2.diff.bz2)=76cbf0cea980568990ff61bb7bded58e518236eb
RIPEMD160(patch-wireshark-1.6.1-to-1.6.2.diff.bz2)=66da92eed7f4681004fa301eda742f3d597a9c69
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk5o/bEACgkQpw8IXSHylJqk9ACbBhi8MNoQyu86H8WWPtvLv8Uh
XdgAn1ugN0oiPp5jkqgGSOI5s37uqyl0
=iNFd
-----END PGP SIGNATURE-----