-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathNEWS
205 lines (165 loc) · 8.11 KB
/
NEWS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
Wireshark 1.10.6 Release Notes
__________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol
analyzer. It is used for troubleshooting, analysis, development
and education.
__________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed.
* [1]wnpa-sec-2014-01
The NFS dissector could crash. Discovered by Moshe Kaplan.
([2]Bug 9672)
Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12
[3]CVE-2014-2281
* [4]wnpa-sec-2014-02
The M3UA dissector could crash. Discovered by Laurent
Butti. ([5]Bug 9699)
Versions affected: 1.10.0 to 1.10.5
[6]CVE-2014-2282
* [7]wnpa-sec-2014-03
The RLC dissector could crash. ([8]Bug 9730)
Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12
[9]CVE-2014-2283
* [10]wnpa-sec-2014-04
The MPEG file parser could overflow a buffer. Discovered by
Wesley Neelen. ([11]Bug 9843)
Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12
[12]CVE-2014-2299
The following bugs have been fixed:
* Customized OUI is not recognized correctly during
dissection. ([13]Bug 9122)
* Properly decode CAPWAP Data Keep-Alives. ([14]Bug 9165)
* Build failure with GTK 3.10 - GTK developers have gone
insane. ([15]Bug 9340)
* SIGSEGV/SIGABRT during free of TvbRange using a chained
dissector in lua. ([16]Bug 9483)
* MPLS dissector no longer registers itself in "ppp.protocol"
table. ([17]Bug 9492)
* Tshark doesn't display the longer data fields (mbtcp).
([18]Bug 9572)
* DMX-CHAN disector does not clear strbuf between rows.
([19]Bug 9598)
* Dissector bug, protocol SDP: proto.c:4214: failed assertion
"length >= 0". ([20]Bug 9633)
* False error: capture file appears to be damaged or corrupt.
([21]Bug 9634)
* SMPP field source_telematics_id field length different from
spec. ([22]Bug 9649)
* Lua: bitop library is missing in Lua 5.2. ([23]Bug 9720)
* GTPv1-C / MM Context / Authentication quintuplet / RAND is
not correct. ([24]Bug 9722)
* Lua: ProtoField.new() is buggy. ([25]Bug 9725)
* Lua: ProtoField.bool() VALUESTRING argument is not optional
but was supposed to be. ([26]Bug 9728)
* Problem with CAPWAP Wireshark Dissector. ([27]Bug 9752)
* nas-eps dissector: CS Service notification dissection stops
after Paging identity IE. ([28]Bug 9789)
New and Updated Features
IPv4 checksum verfification is now disabled by default.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
AppleTalk, CAPWAP, DMX-CHAN, DSI, DVB-CI, ESS, GTPv1, IEEE
802a, M3UA, Modbus/TCP, NAS-EPS, NFS, OpenSafety, SDP, and SMPP
New and Updated Capture File Support
libpcap, MPEG, and pcap-ng
__________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available
from [29]http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark
packages. You can usually install or upgrade Wireshark using
the package management system specific to that platform. A list
of third-party packages can be found on the [30]download page
on the Wireshark web site.
__________________________________________________________
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About->Folders to find the default locations on your system.
__________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([31]Bug
1419)
The BER dissector might infinitely loop. ([32]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([33]Bug 1814)
Filtering tshark captures with read filters (-R) no longer
works. ([34]Bug 2234)
The 64-bit Windows installer does not support Kerberos
decryption. ([35]Win64 development page)
Resolving ([36]Bug 9044) reopens ([37]Bug 3528) so that
Wireshark no longer automatically decodes gzip data when
following a TCP stream.
Application crash when changing real-time option. ([38]Bug
4035)
Hex pane display issue after startup. ([39]Bug 4056)
Packet list rows are oversized. ([40]Bug 4357)
Summary pane selected frame highlighting not maintained.
([41]Bug 4445)
Wireshark and TShark will display incorrect delta times in some
cases. ([42]Bug 4985)
__________________________________________________________
Getting Help
Community support is available on [43]Wireshark's Q&A site and
on the wireshark-users mailing list. Subscription information
and archives for all of Wireshark's mailing lists can be found
on [44]the web site.
Official Wireshark training and certification are available
from [45]Wireshark University.
__________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [46]Wireshark web site.
__________________________________________________________
Last updated 2014-03-06 13:50:43 PST
References
1. https://www.wireshark.org/security/wnpa-sec-2014-01.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9672
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281
4. https://www.wireshark.org/security/wnpa-sec-2014-02.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9699
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282
7. https://www.wireshark.org/security/wnpa-sec-2014-03.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9730
9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283
10. https://www.wireshark.org/security/wnpa-sec-2014-04.html
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843
12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9122
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9165
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9340
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9483
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9492
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9572
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9598
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9633
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9634
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9649
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9720
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9722
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9725
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9728
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9752
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9789
29. http://www.wireshark.org/download.html
30. http://www.wireshark.org/download.html#thirdparty
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
35. https://wiki.wireshark.org/Development/Win64
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
43. http://ask.wireshark.org/
44. http://www.wireshark.org/lists/
45. http://www.wiresharktraining.com/
46. http://www.wireshark.org/faq.html