diff options
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 228 |
1 files changed, 228 insertions, 0 deletions
@@ -0,0 +1,228 @@ + Wireshark 1.12.3 Release Notes + __________________________________________________________________ + +What is Wireshark? + + Wireshark is the world's most popular network protocol analyzer. It is + used for troubleshooting, analysis, development and education. + __________________________________________________________________ + +What's New + + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-01 + The WCCP dissector could crash. ([2]Bug 10720, [3]Bug 10806) + [4]CVE-2015-0559, [5]CVE-2015-0560 + * [6]wnpa-sec-2015-02 + The LPP dissector could crash. ([7]Bug 10773) [8]CVE-2015-0561 + * [9]wnpa-sec-2015-03 + The DEC DNA Routing Protocol dissector could crash. ([10]Bug 10724) + [11]CVE-2015-0562 + * [12]wnpa-sec-2015-04 + The SMTP dissector could crash. ([13]Bug 10823) [14]CVE-2015-0563 + * [15]wnpa-sec-2015-05 + Wireshark could crash while decypting TLS/SSL sessions. Discovered + by Noam Rathaus. [16]CVE-2015-0564 + + The following bugs have been fixed: + * WebSocket dissector: empty payload causes + DISSECTOR_ASSERT_NOT_REACHED. ([17]Bug 9332) + * Wireshark crashes if Lua heuristic dissector returns true. ([18]Bug + 10233) + * Display MEP ID in decimal in OAM Y.1731 Synthetic Loss Message and + Reply PDU. ([19]Bug 10500) + * TCP Window Size incorrectly reported in Packet List. ([20]Bug + 10514) + * Status bar "creeps" to the left a few pixels every time Wireshark + is opened. ([21]Bug 10518) + * E-LMI Message type. ([22]Bug 10531) + * SMTP decoder can dump binary data to terminal in TShark. ([23]Bug + 10536) + * PTPoE dissector gets confused by packets that include an FCS. + ([24]Bug 10611) + * IPv6 Vendor Specific Mobility Option includes the next mobility + option type. ([25]Bug 10618) + * Save PCAP to PCAPng with commentary fails. ([26]Bug 10656) + * Display filter "frame contains bytes [2342]" causes a crash. + ([27]Bug 10690) + * Multipath TCP: checksum displayed when it's not there. ([28]Bug + 10692) + * LTE APN-AMBR is decoded incorrectly. ([29]Bug 10699) + * DNS NAPTR RR Replacement Length is incorrect. ([30]Bug 10700) + * IPv6 Experimental mobility header data is interpreted as options. + ([31]Bug 10703) + * Dissector bug, protocol SPDY: tvbuff.c:610: failed assertion "tvb + && tvb->initialized". ([32]Bug 10704) + * BGP: Incorrect decoding AS numbers when mixed AS size. ([33]Bug + 10742) + * BGP update community - incorrect decoding. ([34]Bug 10746) + * Setting a 6LoWPAN context generates a Wireshark crash. ([35]Bug + 10747) + * FC is not dissected (protocol UNKNOWN). ([36]Bug 10751) + * Crash when displaying several times INFO column. ([37]Bug 10755) + * Decoding of longitude value in LCSAP (3GPP TS 29.171) is incorrect. + ([38]Bug 10767) + * Crash when enabling FCoIB manual settings without filling address + field. ([39]Bug 10796) + * RSVP RECORD_ROUTE IPv4 Subobject Flags field incorrect decoding. + ([40]Bug 10799) + * Wireshark Lua engine can't access protocol field type. ([41]Bug + 10801) + * Field Analysis of OpenFlow v1.4 OFPT_SET_ASYNC. ([42]Bug 10808) + * Lua: getting fieldinfo.value for FT_NONE causes assert. ([43]Bug + 10815) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + 6LoWPAN, ADwin, AllJoyn, Art-Net, Asterix, BGP, Bitcoin, Bluetooth + OBEX, Bluetooth SDP, CFM, CIP, DCERPC PN-IO, DCERPC SPOOLSS, DEC DNA, + DECT, DHCPv6, DNS, DTN, E-LMI, ENIP, Ethernet, Extreme, FCoIB, Fibre + Channel, GED125, GTP, H.248, H.264, HiSLIP, IDRP, IEEE 802.11, IEEE + P1722.1, Infiniband, IrDA, iSCSI, ISUP, LBMR, LCSAP, LPP, MAC LTE, + MAUSB, MBIM, MIM, MIP, MIPv6, MP2T, MPEG-1, NAS EPS, NAT-PMP, NCP, NXP + PN532, OpcUa, OpenFlow, PTP, RDM, RPKI-RTR, RSVP, RTnet, RTSP, SCTP, + SMPP, SMTP, SPDY, Spice, TCP, WCCP, Wi-Fi P2P, and WiMAX + + New and Updated Capture File Support + + and K12 + __________________________________________________________________ + +Getting Wireshark + + Wireshark source code and installation packages are available from + [44]http://www.wireshark.org/download.html. + + Vendor-supplied Packages + + Most Linux and Unix vendors supply their own Wireshark packages. You + can usually install or upgrade Wireshark using the package management + system specific to that platform. A list of third-party packages can be + found on the [45]download page on the Wireshark web site. + __________________________________________________________________ + +File Locations + + Wireshark and TShark look in several different locations for preference + files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations + vary from platform to platform. You can use About->Folders to find the + default locations on your system. + __________________________________________________________________ + +Known Problems + + Dumpcap might not quit if Wireshark or TShark crashes. ([46]Bug 1419) + + The BER dissector might infinitely loop. ([47]Bug 1516) + + Capture filters aren't applied when capturing from named pipes. + ([48]Bug 1814) + + Filtering tshark captures with read filters (-R) no longer works. + ([49]Bug 2234) + + The 64-bit Windows installer does not support Kerberos decryption. + ([50]Win64 development page) + + Resolving ([51]Bug 9044) reopens ([52]Bug 3528) so that Wireshark no + longer automatically decodes gzip data when following a TCP stream. + + Application crash when changing real-time option. ([53]Bug 4035) + + Hex pane display issue after startup. ([54]Bug 4056) + + Packet list rows are oversized. ([55]Bug 4357) + + Wireshark and TShark will display incorrect delta times in some cases. + ([56]Bug 4985) + __________________________________________________________________ + +Getting Help + + Community support is available on [57]Wireshark's Q&A site and on the + wireshark-users mailing list. Subscription information and archives for + all of Wireshark's mailing lists can be found on [58]the web site. + + Official Wireshark training and certification are available from + [59]Wireshark University. + __________________________________________________________________ + +Frequently Asked Questions + + A complete FAQ is available on the [60]Wireshark web site. + __________________________________________________________________ + + Last updated 2015-01-07 12:04:54 PST + +References + + 1. https://www.wireshark.org/security/wnpa-sec-2015-01.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10720 + 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10806 + 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559 + 5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560 + 6. https://www.wireshark.org/security/wnpa-sec-2015-02.html + 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773 + 8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561 + 9. https://www.wireshark.org/security/wnpa-sec-2015-03.html + 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724 + 11. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562 + 12. https://www.wireshark.org/security/wnpa-sec-2015-04.html + 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10823 + 14. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563 + 15. https://www.wireshark.org/security/wnpa-sec-2015-05.html + 16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564 + 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9332 + 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10233 + 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10500 + 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10514 + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10518 + 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10531 + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10536 + 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10611 + 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10618 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10656 + 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10690 + 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10692 + 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10699 + 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10700 + 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10703 + 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10704 + 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10742 + 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10746 + 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10747 + 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10751 + 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10755 + 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10767 + 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10796 + 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10799 + 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10801 + 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10808 + 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10815 + 44. http://www.wireshark.org/download.html + 45. http://www.wireshark.org/download.html#thirdparty + 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 + 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 50. http://wiki.wireshark.org/Development/Win64 + 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 + 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 + 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 + 55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 + 56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 57. http://ask.wireshark.org/ + 58. http://www.wireshark.org/lists/ + 59. http://www.wiresharktraining.com/ + 60. http://www.wireshark.org/faq.html |