Table of Contents
Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education.
The following vulnerabilities have been fixed.
Huzaifa Sidhpurwala of Red Hat Security Response Team discovered that the Infiniband dissector could dereference a NULL pointer. (Bug 6476)
Versions affected: 1.4.0 to 1.4.9, 1.6.0 to 1.6.2.
Huzaifa Sidhpurwala of Red Hat Security Response Team discovered a buffer overflow in the ERF file reader. (Bug 6479)
Versions affected: 1.4.0 to 1.4.9, 1.6.0 to 1.6.2.
The following bugs have been fixed:
Assertion failed when doing File->Quit->Save during live capture. (Bug 1710)
Wrong PCEP XRO sub-object decoding. (Bug 3778)
Decoding [Status Records] Timestamp Sequence Field in Bundle Protocol fails if over 32 bits. (Bug 4109)
wireshark-1.4.2 crashes when testing the example python dissector because of a dissector count assertion. (Bug 5431)
Wireshark crashes when attempting to open a file via drag & drop when there's already a file open. (Bug 5987)
Add the ability to save filters from the Filter Toolbar into buttons on the Filter Toolbar. (Bug 6207)
Adding and removing custom HTTP headers requires a restart. (Bug 6241)
Can't read full 64-bit SNMP values. (Bug 6295)
BACnet property time-synchronization-interval (204) name shown incorrectly as time-synchronization-recipients. (Bug 6336)
[ASN.1 PER] Incorrect decoding of BIT STRING type. (Bug 6347)
Export -> Object -> HTTP -> save all: Error on saving files. (Bug 6362)
Incorrect identification of UDP-encapsulated NAT-keepalive packets. (Bug 6414)
S1AP protocol can't decode IPv6 transportLayerAddress. (Bug 6435)
RTPS2 dissector doesn't handle 0 in the octestToNextHeader field. (Bug 6449)
packet-ajp13 fix, cleanup, and enhancement. (Bug 6452)
Network Instruments Observer file format bugs. (Bug 6453)
Wireshark crashes when using "Open Recent" 2 times in a row. (Bug 6457)
Wireshark packet_gsm-sms, display bug: Filler bits in TP-User Data Header. (Bug 6469)
wireshark unable to decode NetFlow options which have system scope size != 4 bytes. (Bug 6471)
Display filter Expression Dialog Box Error. (Bug 6472)
AJP13, ASN.1 PER, BACapp, DTN, GSM SMS, Infiniband, IPsec, NetFlow, PCEP, RTPS2,
Wireshark source code and installation packages are available from http://www.wireshark.org/download.html.
Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site.
Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system.
Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315)
Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)
The BER dissector might infinitely loop. (Bug 1516)
Capture filters aren't applied when capturing from named pipes. (Bug 1814)
Filtering tshark captures with display filters (-R) no longer works. (Bug 2234)
The 64-bit Windows installer does not ship with the same libraries as the 32-bit installer. (Bug 3610)
Hex pane display issue after startup. (Bug 4056)
Packet list rows are oversized. (Bug 4357)
Summary pane selected frame highlighting not maintained. (Bug 4445)
Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site.
Training is available from Wireshark University.
A complete FAQ is available on the Wireshark web site.