Table of Contents
Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education.
The following vulnerabilities have been fixed.
The ATN-CPDLC dissector could crash. (Bug 9952) CVE-2015-2187
The WCP dissector could crash. (Bug 10844) CVE-2015-2188
The pcapng file parser could crash. (Bug 10895) CVE-2015-2189
The LLDP dissector could crash. (Bug 10983) CVE-2015-2190
The TNEF dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich. (Bug 11023) CVE-2015-2191
The SCSI OSD dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich. (Bug 11024) CVE-2015-2192
The following bugs have been fixed:
- RTP player crashes on decode of long call: BadAlloc (insufficient resources for operation). (Bug 2630)
- "Telephony→SCTP→Analyse This Association" crashes Wireshark on manufactured SCTP packet. (Bug 9849)
- IPv6 Mobility Header Link Layer Address is parsed incorrectly. (Bug 10006)
- DNS NXT RR is parsed incorrectly. (Bug 10615)
- IPv6 AUTH mobility option parses Mobility SPI and Authentication Data incorrectly. (Bug 10626)
- IPv6 Mobility Header Link-Layer Address Mobility Option is parsed incorrectly. (Bug 10627)
- HTTP chunked response includes data beyond the chunked response. (Bug 10707)
- DHCP Option 125 Suboption: (1) option-len always expects 1 but specification allows for more. (Bug 10784)
- Incorrect decoding of IPv4 Interface/Neighbor Address sub-TLVs in Extended IS Reachability TLV of IS-IS. (Bug 10837)
- Little-endian OS X Bluetooth PacketLogger files aren’t handled. (Bug 10861)
- X.509 certificate serial number incorrectly interpreted as negative number. (Bug 10862)
- Malformed Packet on rsync-version with length 2. (Bug 10863)
- ZigBee epoch time is incorrectly displayed in OTA cluster. (Bug 10872)
- BGP EVPN - Route Type 4 - "Invalid length of IP Address" - "Expert Info" shows a false error. (Bug 10873)
- Bad bytes read for extended rnc id value in GTP dissector. (Bug 10877)
- "ServiceChangeReasonStr" messages are not shown in txt generated by tshark. (Bug 10879)
- Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI. (Bug 10897)
- MEGACO wrong decoding on media port. (Bug 10898)
- Wrong media format. (Bug 10899)
- BSSGP Status PDU decoding fault (missing Mandatory element (0x04) BVCI for proper packet). (Bug 10903)
- DNS LOC Precision missing units. (Bug 10940)
- Packets on OpenBSD loopback decoded as raw not null. (Bug 10956)
- Display Filter Macro unable to edit. (Bug 10957)
- IPv6 Local Mobility Anchor Address mobility option code is treated incorrectly. (Bug 10961)
- SNTP server list improperly formatted in DHCPv6 packet details. (Bug 10964)
- Juniper Packet Mirror dissector expects ipv6 flow label = 0. (Bug 10976)
- NS Trace (NetScaler Trace) file format is not able to export specified packets. (Bug 10998)
ACN, ANSI IS-637-A, AppleMIDI, ATN-CPDLC, BGP, BSSGP, CMIP, DHCP, DHCPv6, DIS, DLM3, DMP, DNS, Extreme Networks, ForCES, FTAM, GMHDR, GSM A BSSMAP, GSM A-bis OML, GSM MAP, GSM RLC MAC, GTP, H.248, H.264, HTTP, IEEE 802.11, IPv6, IS-IS, ISMACryp, J1939, Juniper Jmirror, KDP, L2CAP, LDAP, LLDP, MGCP, MIP6, NBNS, NET/ROM, Netflow, Novell PKIS, PANA, PPPoE, RSL, RSYNC, RTMPT, RTP, SCSI OSD, SDP, SMB Pipe, SMPP, SYNCHROPHASOR, TETRA, TiVoConnect, TNEF, USB HID, V.52, VSS-Monitoring, X.509AF, Zebra, and ZigBee
Wireshark source code and installation packages are available from http://www.wireshark.org/download.html.
Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site.
Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system.
Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)
The BER dissector might infinitely loop. (Bug 1516)
Capture filters aren’t applied when capturing from named pipes. (Bug 1814)
Filtering tshark captures with read filters (-R) no longer works. (Bug 2234)
The 64-bit Windows installer does not support Kerberos decryption. (Win64 development page)
Resolving (Bug 9044) reopens (Bug 3528) so that Wireshark no longer automatically decodes gzip data when following a TCP stream.
Application crash when changing real-time option. (Bug 4035)
Hex pane display issue after startup. (Bug 4056)
Packet list rows are oversized. (Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985)
Community support is available on Wireshark’s Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark’s mailing lists can be found on the web site.
Official Wireshark training and certification are available from Wireshark University.
A complete FAQ is available on the Wireshark web site.