Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-users: [Wireshark-users] Wireshark 1.10.2 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 10 Sep 2013 12:52:19 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.10.2.

     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2013-54
       The Bluetooth HCI ACL dissector could crash. Discovered by
       Laurent Butti. ([2]Bug 8827)
       Versions affected: 1.10.0 to 1.10.1
     * [3]wnpa-sec-2013-55
       The NBAP dissector could crash. Discovered by Laurent
       Butti. ([4]Bug 9005)
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
     * [5]wnpa-sec-2013-56
       The ASSA R3 dissector could go into an infinite loop.
       Discovered by Ben Schmidt. ([6]Bug 9020)
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
     * [7]wnpa-sec-2013-57
       The RTPS dissector could overflow a buffer. Discovered by
       Ben Schmidt. ([8]Bug 9019)
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
     * [9]wnpa-sec-2013-58
       The MQ dissector could crash. ([10]Bug 9079)
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
     * [11]wnpa-sec-2013-59
       The LDAP dissector could crash. Versions affected: 1.10.0
       to 1.10.1, 1.8.0 to 1.8.9
     * [12]wnpa-sec-2013-60
       The Netmon file parser could crash. Discovered by G.
       Geshev. ([13]Bug 8742)
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9

   The following bugs have been fixed:
     * Lua ByteArray:append() causes wireshark crash. ([14]Bug
       4461)
     * Lua script can not get "data-text-lines" protocol data.
       ([15]Bug 5200)
     * Lua: Trying to use Field.new("tcp.segments") to get
       reassembled TCP data is failed. ([16]Bug 5201)
     * "Edit Interface Settings": "Capture Filter" combo box is
       not populated across Wireshark sessions. ([17]Bug 7278)
     * PER normally small non-negative whole number decoding is
       wrong when >= 64. ([18]Bug 8841)
     * Strange behavior of tree expand/collapse in packet details.
       ([19]Bug 8908)
     * Incorrect parsing of IPFIX *IpTotalLength elements.
       ([20]Bug 8918)
     * IO graph/advanced, max/min/summ error on frames with
       multiple Diameter messages. ([21]Bug 8980)
     * pod2man error on reordercap.pod. ([22]Bug 8982)
     * SGI Nsym disambiguation is unconditionally displayed when
       dissecting VHT. ([23]Bug 8989)
     * The Wireshark icon doesn't show up in OS X 10.5. ([24]Bug
       8993)
     * Build fails if system Python is version 3+. ([25]Bug 8995)
     * SCSI dissector does not parse PERSISTENT RESERVE commands
       correctly. ([26]Bug 9012)
     * SDP messages throws an assert. ([27]Bug 9022)
     * Wireshark fails to decode single-line, multiple Contact:
       URIs in SIP responses. ([28]Bug 9031)
     * PN_MRP LinkUp Message is shown as LinkDown in info.
       ([29]Bug 9035)
     * Dissector for EtherCAT: ADS highlighting in the Packet
       Bytes Pane is incorrect. ([30]Bug 9036)
     * 802.11 HT Extended Capabilities B10 decode incorrect.
       ([31]Bug 9038)
     * Wrong dissection of MSTI Root Identifiers for all MSTIs.
       ([32]Bug 9088)
     * Weird malformed HTTP error. ([33]Bug 9101)
     * Warning for attempting to install 64-bit Wireshark on a
       32-bit machine has an embedded "\n". ([34]Bug 9103)
     * Wireshark crashes when using "Export Specified Packets" >
       "Displayed". ([35]Bug 9106)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ASN.1 PER, ASSA R3, Bluetooth HCI ACL, EtherCAT AMS, GTPv2,
   HTTP, IEEE 802.11, IPFIX, ISDN SUP, LDAP, MQ, NBAP, Novell SSS,
   PROFINET MRP, Radiotap, ROHC, RTPS, SCSI, SIP, and STP

  New and Updated Capture File Support

   Microsoft Network Monitor.
     __________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available
   from [36]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [37]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([38]Bug
   1419)

   The BER dissector might infinitely loop. ([39]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([40]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([41]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([42]Win64 development page)

   Application crash when changing real-time option. ([43]Bug
   4035)

   Hex pane display issue after startup. ([44]Bug 4056)

   Packet list rows are oversized. ([45]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([46]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([47]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [48]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [49]the web site.

   Official Wireshark training and certification are available
   from [50]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [51]Wireshark web site.
     __________________________________________________________

   Last updated 2013-09-10 08:39:52 PDT

References

   1. https://www.wireshark.org/security/wnpa-sec-2013-54.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8827
   3. https://www.wireshark.org/security/wnpa-sec-2013-55.html
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9005
   5. https://www.wireshark.org/security/wnpa-sec-2013-56.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9020
   7. https://www.wireshark.org/security/wnpa-sec-2013-57.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9019
   9. https://www.wireshark.org/security/wnpa-sec-2013-58.html
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9079
  11. https://www.wireshark.org/security/wnpa-sec-2013-59.html
  12. https://www.wireshark.org/security/wnpa-sec-2013-60.html
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4461
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5200
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5201
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7278
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8841
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8908
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8918
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8980
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8982
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8989
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8993
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8995
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9012
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9022
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9031
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9035
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9036
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9038
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9088
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9101
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9103
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9106
  36. http://www.wireshark.org/download.html
  37. http://www.wireshark.org/download.html#thirdparty
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  42. https://wiki.wireshark.org/Development/Win64
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  48. http://ask.wireshark.org/
  49. http://www.wireshark.org/lists/
  50. http://www.wiresharktraining.com/
  51. http://www.wireshark.org/faq.html


Digests

wireshark-1.10.2.tar.bz2: 26667284 bytes
MD5(wireshark-1.10.2.tar.bz2)=cd7fedd0a67df5ad4905fd356efdc1e8
SHA1(wireshark-1.10.2.tar.bz2)=1f8f877f17dea23e1cf2bafeef0f71323df43521
RIPEMD160(wireshark-1.10.2.tar.bz2)=675d1fb55d5b40432deb3187f5e87036f377e5df

Wireshark-win32-1.10.2.exe: 22116616 bytes
MD5(Wireshark-win32-1.10.2.exe)=daeb8836a150bd7b808cd192ff301c03
SHA1(Wireshark-win32-1.10.2.exe)=bc71582264f96aea9f329b93604330c9ca6525e6
RIPEMD160(Wireshark-win32-1.10.2.exe)=b93e3c7d7f52fc102cd013f93b81c2639913da4b

Wireshark-win64-1.10.2.exe: 27966944 bytes
MD5(Wireshark-win64-1.10.2.exe)=08cf4e92a785215f80cb9c0c8b20a9ee
SHA1(Wireshark-win64-1.10.2.exe)=14d00e21405eab7b0470d4b2b9f66d7b66875d68
RIPEMD160(Wireshark-win64-1.10.2.exe)=d6d911e19499336ae7afe637c1b60b6bc6284c2a

Wireshark-1.10.2.u3p: 30586569 bytes
MD5(Wireshark-1.10.2.u3p)=3ec1018e8aeb9d03bbaa210e6fa5690f
SHA1(Wireshark-1.10.2.u3p)=8e766387ec0c67f35f6ce8e8d30034ac7e9cacc4
RIPEMD160(Wireshark-1.10.2.u3p)=6eacf50eaf66048c3c600f849f4ef611741c9a86

WiresharkPortable-1.10.2.paf.exe: 23474264 bytes
MD5(WiresharkPortable-1.10.2.paf.exe)=eb83372c2444779502fb81d1146271dd
SHA1(WiresharkPortable-1.10.2.paf.exe)=673ec8dd9d49161fb9d874b19ad8a2288d303d40
RIPEMD160(WiresharkPortable-1.10.2.paf.exe)=15a0303b24466d5d75fbac4b9ba2adbd34009bfd

Wireshark 1.10.2 Intel 32.dmg: 20413812 bytes
MD5(Wireshark 1.10.2 Intel 32.dmg)=e8246764df76baaddddb4e726bb962c1
SHA1(Wireshark 1.10.2 Intel
32.dmg)=cfab1eefeebd5f337bbf3aa2aec9bad058b45880
RIPEMD160(Wireshark 1.10.2 Intel
32.dmg)=4689e3447d30578ba1c5acece3f88cedfcc8b0bb

Wireshark 1.10.2 Intel 64.dmg: 24035674 bytes
MD5(Wireshark 1.10.2 Intel 64.dmg)=c4a8684dc0421c50480410404a2cbd58
SHA1(Wireshark 1.10.2 Intel
64.dmg)=f3af6443f7c25c27824014fd88e8cb1460ecbb08
RIPEMD160(Wireshark 1.10.2 Intel
64.dmg)=d92a4b4c82666e1046f636747fc8c71c6e86cba0

patch-wireshark-1.10.1-to-1.10.2.bz2: 707143 bytes
MD5(patch-wireshark-1.10.1-to-1.10.2.bz2)=f2dec484abafe7172e32843b685f37d2
SHA1(patch-wireshark-1.10.1-to-1.10.2.bz2)=be360df86926fea8ec6dbc00f6a5a1ba5dfa4b1f
RIPEMD160(patch-wireshark-1.10.1-to-1.10.2.bz2)=6da1393ce74aa66a0c71a1d907f19ef0a6f3f189
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlIveHMACgkQpw8IXSHylJqxYQCfbs7ospZd/ruPwQNpDlCqN3Gh
R00AoJy6KpSY+6rpPygmUOUf+L/zIaf4
=muK5
-----END PGP SIGNATURE-----