Table of Contents
Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.
The following vulnerabilities have been fixed. See the security advisory for details and a workaround.
Wireshark could crash when reading an MP3 file.
Versions affected: 0.99.6
Beyond Security discovered that Wireshark could loop excessively while reading a malformed DNP3 packet.
Versions affected: 0.10.12 to 0.99.6
Stefan Esser discovered a buffer overflow in the SSL dissector.
Versions affected: 0.99.0 to 0.99.6
The ANSI MAP dissector could be susceptible to a buffer overflow on some platforms.
Versions affected: 0.99.5 to 0.99.6
The Firebird/Interbase dissector could go into an infinite loop or crash.
Versions affected: 0.99.6
The NCP dissector could cause a crash.
Versions affected: 0.99.6
The HTTP dissector could crash on some systems while decoding chunked messages.
Versions affected: 0.10.14 to 0.99.6
The MEGACO dissector could enter a large loop and consume system resources.
Versions affected: 0.9.14 to 0.99.6
The DCP ETSI dissector could enter a large loop and consume system resources.
Versions affected: 0.99.6
Fabiodds discovered a buffer overflow in the iSeries (OS/400) Communication trace file parser.
Versions affected: 0.99.0 to 0.99.6
The PPP dissector could overflow a buffer.
Versions affected: 0.99.6
The Bluetooth SDP dissector could go into an infinite loop.
Versions affected: 0.99.2 to 0.99.6
A malformed RPC Portmap packet could cause a crash.
Versions affected: 0.8.16 to 0.99.6
The IPv6 dissector could loop excessively.
Versions affected: 0.99.6
The USB dissector could loop excessively or crash.
Versions affected: 0.99.6
The SMB dissector could crash.
Versions affected: 0.99.6
The RPL dissector could go into an infinite loop.
Versions affected: 0.9.8 to 0.99.6
The WiMAX dissector could crash due to unaligned access on some platforms.
Versions affected: 0.99.6
The CIP dissector could attempt to allocate a huge amount of memory and crash.
Versions affected: 0.9.14 to 0.99.6
The following bugs have been fixed:
Handling of non-ASCII file names and paths has been improved.
Wireshark could crash while editing a coloring rule or a UAT table.
The display filter code could crash while bitwise ANDing an IPv4 address.
The following features are new (or have been significantly updated) since the last release:
Most of the capture code has been moved out of the GUI, which means that Wireshark no longer needs to be run as root.
Many display filter names have been cleaned up. If your favorite display filter just went missing, please consult the display filter reference to find out where it ended up.
You can now filter directly on SNMP OIDs.
IO graphs have more display options, and you can now export graphs.
You can now follow UDP streams in addition to TCP and SSL streams.
You can now disable coloring rules without deleting them.
Main window toolbar buttons are now available even when the window is small.
The version of WinPcap that ships with the Windows installers has been updated to 4.0.2.
The Windows installers now include a "services" file, which maps port numbers to names.
The Windows installer now enables npf.sys by default under Vista. Wireshark will print a warning at startup if npf.sys isn't loaded under Vista.
Optimizations have been applied in some places to make Wireshark start up and run faster.
ANSI TCAP, application/xcap-error (MIME type), CFM, DPNSS, EtherCAT, ETSI e2/e4, H.282, H.460, H.501, IEEE 802.1ad and 802.1ah, IMF (RFC 2822), RSL, SABP, T.125, TNEF, TPNCP, UNISTIM, Wake on LAN, WiMAX ASN Control Plane, X.224,
3Com XNS, 3G A11, ACN, ACP123, ACSE, AIM, ANSI IS-637-A, ANSI MAP, Armagetronad, BACapp, BACnet, BER, BFD, BGP, Bluetooth, CAMEL, CDT, CFM, CIP, Cisco ERSPAN, CLNP, CMIP, CMS, COPS, CTDB, DCCP, DCERPC ATSVC, DCERPC PNIO, DCERPC SAMR, DCERPC, DCOM CBA-ACCO, DCP ETSI, DEC DNA, DFS, DHCP/BOOTP, DHCPv6, DIAMETER, DISP, DMP, DNP, DNS, DOP, DTLS, DUA, eDonkey, ELSM, ESL, Ethernet, FC ELS, FC, FCOE, FTAM, FTP, GDSDB, GIOP, GPRS-LLC, GSM A, GSM MAP, GTP, HSRP, HTTP, IAX2, ICMPv6, IEEE 802.11, INAP, IP, IPMI, IPv6, ISAKMP, ISIS, iSNS, ISUP, IUUP, JXTA, K12, Kerberos, L2TP, LAPD, LDAP, LINX, LPD, LWAPP, MEGACO, MIKEY, MIME Multipart, MMS, MP2T, MPEG PES, MPEG, MTP2, MySQL, NBAP, NetFlow, nettl, NFS, NSIP, OSPF, P_MUL, PANA, PER, PKCS#12, PMIPv6, PN-PTCP, PN-RT, PPI, PPPoE, PRES, PROFINET, PTP, Q.932 ROS, Q.932, QSIG, Radiotap, RADIUS, RANAP, RNSAP, ROS, RTCP, RTP, RTSE, RTSP, SCCP, SCTP, SDP, SIGCOMP, SIP, Slow Protocols, SMB, SMPP, SMTP, SNDCP, SNMP, SRP, SSL, STANAG 4406, STUN2, TCAP, TCP, text/media, TIPC, ULP, UMA, UMTS FP, V5UA, VNC, WiMAX M2M, WiMAX, WLCCP, X.411, X.420, X.509 SAT, XML,
Wireshark source code and installation packages are available from the download page on the main web site.
Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site.
Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system.
Saving to the currently-open file doesn't work under Windows. (Bug 2080)
The Bug 942)
button is nonfunctional in the file dialogs under Windows. (GTK+ 2.x renders white text on 8-bit displays under Windows. You can work around this by installing the GTK+ 1.2 version of Wireshark or by increasing your display depth to 15 bits or more.
Community support is available on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site.
Commercial support, training, and development services are available from CACE Technologies.
A complete FAQ is available on the Wireshark web site.