Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-users: [Wireshark-users] Wireshark 1.6.6 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 27 Mar 2012 13:08:53 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.6.6.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.

     o wnpa-sec-2012-04

       The ANSI A dissector could dereference a NULL pointer and
       crash. (Bug 6823)

       Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5.

     o wnpa-sec-2012-05

       The IEEE 802.11 dissector could go into an infinite loop. (Bug
       6809)

       Versions affected: 1.6.0 to 1.6.5.

     o wnpa-sec-2012-06

       The pcap and pcap-ng file parsers could crash trying to read
       ERF data. (Bug 6804)

       Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5.

     o wnpa-sec-2012-07

       The MP2T dissector could try to allocate too much memory and
       crash. (Bug 6804)

       Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5.

     o The Windows installers now include GnuTLS 1.12.18, which fixes
       several vulnerabilities.

   The following bugs have been fixed:

     o ISO SSAP: ActivityStart: Invalid decoding the activity
       parameter as a BER Integer. (Bug 2873)

     o Forward slashes in URI need to be converted to backslashes if
       WIN32. (Bug 5237)

     o Character echo pauses in Capture Filter field in Capture
       Options. (Bug 5356)

     o Some PGM options are not parsed correctly. (Bug 5687)

     o dumpcap crashes when capturing from pipe to a pcap-ng file
       (e.g., when passing data from CACE Pilot to Wireshark). (Bug
       5939)

     o Unable to rearrange columns in preferences on Windows. (Bug
       6077) (Note: this bug still affects the 64-bit package)

     o No error for UDP/IPv6 packet with zero checksum. (Bug 6232)

     o Wireshark installer doesn't add access_bpf in 10.5.8. (Bug
       6526)

     o Corrupted Diameter dictionary file that crashes Wireshark.
       (Bug 6664)

     o packetBB dissector bug: More than 1000000 items in the tree --
       possible infinite loop. (Bug 6687)

     o ZEP dissector: Timestamp not always displayed correctly.
       Fractional seconds never displayed. (Bug 6703)

     o GOOSE Messages don't use the length field to perform the
       dissection. (Bug 6734)

     o Ethernet traces in K12 text format sometimes give bogus
       "malformed frame" errors and other problems. (Bug 6735)

     o max_ul_ext isn't printed/decoded to the packet details log in
       GTP protocol packet. (Bug 6761)

     o non-IPP packets to or from port 631 are dissected as IPP. (Bug
       6765)

     o lua proto registration fails for uppercase proto /
       g_ascii_strdown problem. (Bug 6766)

     o no menu item Fle->Export->SSL Session Keys in GTK. (Bug 6813)

     o IAX2 dissector reads past end of packet for unknown IEs. (Bug
       6815)

     o TShark 1.6.5 immediately crashes on SSL decryption (every
       time). (Bug 6817)

     o USB: unknown GET DESCRIPTOR response triggers assert failure.
       (Bug 6826)

     o IEEE1588 PTPv2 over IPv6. (Bug 6836)

     o Patch to fix DTLS decryption. (Bug 6847)

     o Expression... dialog crash. (Bug 6891)

     o display filter "gtp.msisdn" not working. (Bug 6947)

     o Multiprotocol Label Switching Echo - Return Code: Reserved
       (5). (Bug 6951)

     o ISAKMP : VendorID CheckPoint : Malformed Packet. (Bug 6972)

     o Adding a Custom HTTP Header Field with a trailing colon causes
       wireshark to immediately crash (and crash upon restart). (Bug
       6982)

     o Radiotap dissector lists a bogus "DBM TX Attenuation" bit.
       (Bug 7000)

     o MySQL dissector assertion. (Ask 8649)

     o Radiotap header format data rate alignment issues. (Ask 8649)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ANSI A, BSSGP, DIAMETER, DTLS, GOOSE, GSM Management, GTP, HTTP,
   IAX2, IEEE 802.11, IPP, ISAKMP, ISO SSAP, MP2T, MPLS, MySQL, NTP,
   PacketBB, PGM, Radiotap, SSL, TCP, UDP, USB, WSP

  New and Updated Capture File Support

   Endace ERF, Pcap-NG, Tektronix K12

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About→Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with libsmi. (Win64
   development page)

   Application crash when changing real-time option. (Bug 4035)

   Hex pane display issue after startup. (Bug 4056)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

   Wireshark and TShark will display incorrect delta times when
   displayed as a custom column. (Bug 4985)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.


Digests

wireshark-1.6.6.tar.bz2: 21527655 bytes
MD5(wireshark-1.6.6.tar.bz2)=61145ccd7684b3cfb159fc902fedfecf
SHA1(wireshark-1.6.6.tar.bz2)=0b60fd7d117e78292548fd50d71f750a5dca8b37
RIPEMD160(wireshark-1.6.6.tar.bz2)=27a3d7fa7f78350dabb00d3ee382c335f7e110ae

wireshark-win64-1.6.6.exe: 22760504 bytes
MD5(wireshark-win64-1.6.6.exe)=a9f5fea05e277a948e9c585642115df3
SHA1(wireshark-win64-1.6.6.exe)=89dbaf374a1be818b1cc10f748b120c09484fe9e
RIPEMD160(wireshark-win64-1.6.6.exe)=d56f52d18b9d3c30d6cdee15ffc70c8d308e2c24

wireshark-win32-1.6.6.exe: 19585469 bytes
MD5(wireshark-win32-1.6.6.exe)=c89af0c8fc3008a240189a5d30d661cf
SHA1(wireshark-win32-1.6.6.exe)=9484b742e71b4b566dc9594c446322ef50674eb4
RIPEMD160(wireshark-win32-1.6.6.exe)=c0dcae642fbdeb26cf22aa2787eb7af4be5a4451

wireshark-1.6.6.u3p: 26122267 bytes
MD5(wireshark-1.6.6.u3p)=7f178814800b26a5d83f181f6e6a8fa0
SHA1(wireshark-1.6.6.u3p)=b6143156174e0f2f3977460416fee02736438ea9
RIPEMD160(wireshark-1.6.6.u3p)=7c8a2d22b9e9572e71f3a2955191ca53e83830a7

WiresharkPortable-1.6.6.paf.exe: 20473388 bytes
MD5(WiresharkPortable-1.6.6.paf.exe)=b8089c4dd1665b00a22171761ed0608a
SHA1(WiresharkPortable-1.6.6.paf.exe)=863d7fe1f9578e04322ca21a1328534c4d88f836
RIPEMD160(WiresharkPortable-1.6.6.paf.exe)=86d0805e48387f5c2400b240b1563ac980d72c40

Wireshark 1.6.6 PPC 32.dmg: 21197095 bytes
MD5(Wireshark 1.6.6 PPC 32.dmg)=e0199168e1ff9ac47aacc7b2cd4ff47a
SHA1(Wireshark 1.6.6 PPC 32.dmg)=4ddb12b6d6dc83890929ca2b0aa22ede1c7f55ff
RIPEMD160(Wireshark 1.6.6 PPC
32.dmg)=dcb8774fe9b4e060eb0c1c849fc2791d0b6f397e

Wireshark 1.6.6 Intel 32.dmg: 20509045 bytes
MD5(Wireshark 1.6.6 Intel 32.dmg)=c2e2dfc116576b7d4aa74629b90c8f80
SHA1(Wireshark 1.6.6 Intel
32.dmg)=d0c8a7c37606f4ef500ff356bb0a28d065fc501f
RIPEMD160(Wireshark 1.6.6 Intel
32.dmg)=e3703274cfe10e1aebf4eb3fa18332b6b7f0f6c9

Wireshark 1.6.6 Intel 64.dmg: 20312861 bytes
MD5(Wireshark 1.6.6 Intel 64.dmg)=1d709f4e0ce3c95a8dea6569c286233d
SHA1(Wireshark 1.6.6 Intel
64.dmg)=2e4d60e28496f49c7e39b7eb578b47735292fd99
RIPEMD160(Wireshark 1.6.6 Intel
64.dmg)=e822633b6282cd21055e7add81d51315b0f4c172

patch-wireshark-1.6.5-to-1.6.6.diff.bz2: 189850 bytes
MD5(patch-wireshark-1.6.5-to-1.6.6.diff.bz2)=e1572a44d486640ab24765cdc215e7f6
SHA1(patch-wireshark-1.6.5-to-1.6.6.diff.bz2)=b96c362152f14d8b20e9a28f8ebd7f8dd1450198
RIPEMD160(patch-wireshark-1.6.5-to-1.6.6.diff.bz2)=a77c1e3dce5f35181c34efd62e9a4f197c9a0d63
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk9yHlUACgkQpw8IXSHylJrqEwCeKPKwxaF4FIVbIFM9HS0weEs7
+uQAn3SVGzL6xDpux3HNoI/OrMkFBOAG
=7V3O
-----END PGP SIGNATURE-----