You are on page 1of 4

Wireshark 1.12.

3 Release Notes
__________________________________________________________________

What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is


used for troubleshooting, analysis, development and education.
__________________________________________________________________

What's New

Bug Fixes

The following vulnerabilities have been fixed.


* [1]wnpa-sec-2015-01
The WCCP dissector could crash. ([2]Bug 10720, [3]Bug 10806)
[4]CVE-2015-0559, [5]CVE-2015-0560
* [6]wnpa-sec-2015-02
The LPP dissector could crash. ([7]Bug 10773) [8]CVE-2015-0561
* [9]wnpa-sec-2015-03
The DEC DNA Routing Protocol dissector could crash. ([10]Bug 10724)
[11]CVE-2015-0562
* [12]wnpa-sec-2015-04
The SMTP dissector could crash. ([13]Bug 10823) [14]CVE-2015-0563
* [15]wnpa-sec-2015-05
Wireshark could crash while decypting TLS/SSL sessions. Discovered
by Noam Rathaus. [16]CVE-2015-0564

The following bugs have been fixed:


* WebSocket dissector: empty payload causes
DISSECTOR_ASSERT_NOT_REACHED. ([17]Bug 9332)
* Wireshark crashes if Lua heuristic dissector returns true. ([18]Bug
10233)
* Display MEP ID in decimal in OAM Y.1731 Synthetic Loss Message and
Reply PDU. ([19]Bug 10500)
* TCP Window Size incorrectly reported in Packet List. ([20]Bug
10514)
* Status bar "creeps" to the left a few pixels every time Wireshark
is opened. ([21]Bug 10518)
* E-LMI Message type. ([22]Bug 10531)
* SMTP decoder can dump binary data to terminal in TShark. ([23]Bug
10536)
* PTPoE dissector gets confused by packets that include an FCS.
([24]Bug 10611)
* IPv6 Vendor Specific Mobility Option includes the next mobility
option type. ([25]Bug 10618)
* Save PCAP to PCAPng with commentary fails. ([26]Bug 10656)
* Display filter "frame contains bytes [2342]" causes a crash.
([27]Bug 10690)
* Multipath TCP: checksum displayed when it's not there. ([28]Bug
10692)
* LTE APN-AMBR is decoded incorrectly. ([29]Bug 10699)
* DNS NAPTR RR Replacement Length is incorrect. ([30]Bug 10700)
* IPv6 Experimental mobility header data is interpreted as options.
([31]Bug 10703)
* Dissector bug, protocol SPDY: tvbuff.c:610: failed assertion "tvb
&& tvb->initialized". ([32]Bug 10704)
* BGP: Incorrect decoding AS numbers when mixed AS size. ([33]Bug
10742)
* BGP update community - incorrect decoding. ([34]Bug 10746)
* Setting a 6LoWPAN context generates a Wireshark crash. ([35]Bug
10747)
* FC is not dissected (protocol UNKNOWN). ([36]Bug 10751)
* Crash when displaying several times INFO column. ([37]Bug 10755)
* Decoding of longitude value in LCSAP (3GPP TS 29.171) is incorrect.
([38]Bug 10767)
* Crash when enabling FCoIB manual settings without filling address
field. ([39]Bug 10796)
* RSVP RECORD_ROUTE IPv4 Subobject Flags field incorrect decoding.
([40]Bug 10799)
* Wireshark Lua engine can't access protocol field type. ([41]Bug
10801)
* Field Analysis of OpenFlow v1.4 OFPT_SET_ASYNC. ([42]Bug 10808)
* Lua: getting fieldinfo.value for FT_NONE causes assert. ([43]Bug
10815)

New and Updated Features

There are no new features in this release.

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

6LoWPAN, ADwin, AllJoyn, Art-Net, Asterix, BGP, Bitcoin, Bluetooth


OBEX, Bluetooth SDP, CFM, CIP, DCERPC PN-IO, DCERPC SPOOLSS, DEC DNA,
DECT, DHCPv6, DNS, DTN, E-LMI, ENIP, Ethernet, Extreme, FCoIB, Fibre
Channel, GED125, GTP, H.248, H.264, HiSLIP, IDRP, IEEE 802.11, IEEE
P1722.1, Infiniband, IrDA, iSCSI, ISUP, LBMR, LCSAP, LPP, MAC LTE,
MAUSB, MBIM, MIM, MIP, MIPv6, MP2T, MPEG-1, NAS EPS, NAT-PMP, NCP, NXP
PN532, OpcUa, OpenFlow, PTP, RDM, RPKI-RTR, RSVP, RTnet, RTSP, SCTP,
SMPP, SMTP, SPDY, Spice, TCP, WCCP, Wi-Fi P2P, and WiMAX

New and Updated Capture File Support

and K12
__________________________________________________________________

Getting Wireshark

Wireshark source code and installation packages are available from


[44]http://www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [45]download page on the Wireshark web site.
__________________________________________________________________

File Locations

Wireshark and TShark look in several different locations for preference


files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________

Known Problems

Dumpcap might not quit if Wireshark or TShark crashes. ([46]Bug 1419)

The BER dissector might infinitely loop. ([47]Bug 1516)

Capture filters aren't applied when capturing from named pipes.


([48]Bug 1814)

Filtering tshark captures with read filters (-R) no longer works.


([49]Bug 2234)

The 64-bit Windows installer does not support Kerberos decryption.


([50]Win64 development page)

Resolving ([51]Bug 9044) reopens ([52]Bug 3528) so that Wireshark no


longer automatically decodes gzip data when following a TCP stream.

Application crash when changing real-time option. ([53]Bug 4035)

Hex pane display issue after startup. ([54]Bug 4056)

Packet list rows are oversized. ([55]Bug 4357)

Wireshark and TShark will display incorrect delta times in some cases.
([56]Bug 4985)
__________________________________________________________________

Getting Help

Community support is available on [57]Wireshark's Q&A site and on the


wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [58]the web site.

Official Wireshark training and certification are available from


[59]Wireshark University.
__________________________________________________________________

Frequently Asked Questions

A complete FAQ is available on the [60]Wireshark web site.


__________________________________________________________________

Last updated 2015-01-07 12:04:54 PST

References

1. https://www.wireshark.org/security/wnpa-sec-2015-01.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10720
3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10806
4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559
5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560
6. https://www.wireshark.org/security/wnpa-sec-2015-02.html
7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773
8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561
9. https://www.wireshark.org/security/wnpa-sec-2015-03.html
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724
11. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562
12. https://www.wireshark.org/security/wnpa-sec-2015-04.html
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10823
14. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563
15. https://www.wireshark.org/security/wnpa-sec-2015-05.html
16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9332
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10233
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10500
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10514
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10518
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10531
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10536
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10611
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10618
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10656
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10690
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10692
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10699
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10700
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10703
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10704
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10742
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10746
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10747
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10751
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10755
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10767
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10796
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10799
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10801
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10808
43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10815
44. http://www.wireshark.org/download.html
45. http://www.wireshark.org/download.html#thirdparty
46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
50. http://wiki.wireshark.org/Development/Win64
51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
57. http://ask.wireshark.org/
58. http://www.wireshark.org/lists/
59. http://www.wiresharktraining.com/
60. http://www.wireshark.org/faq.html

You might also like