Now
MAIN commitmail json YAML
wireshark: update to 2.6.5.
Wireshark 2.6.5 Release Notes
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2018-51[1] The Wireshark dissection engine could crash.
Bug 14466[2]. CVE-2018-19625[3].
• wnpa-sec-2018-52[4] The DCOM dissector could crash. Bug 15130[5].
CVE-2018-19626[6].
• wnpa-sec-2018-53[7] The LBMPDM dissector could crash. Bug
15132[8]. CVE-2018-19623[9].
• wnpa-sec-2018-54[10] The MMSE dissector could go into an infinite
loop. Bug 15250[11]. CVE-2018-19622[12].
• wnpa-sec-2018-55[13] The IxVeriWave file parser could crash. Bug
15279[14]. CVE-2018-19627[15].
• wnpa-sec-2018-56[16] The PVFS dissector could crash. Bug
15280[17]. CVE-2018-19624[18].
• wnpa-sec-2018-57[19] The ZigBee ZCL dissector could crash. Bug
15281[20]. CVE-2018-19628[21].
The following bugs have been fixed:
• VoIP Calls dialog doesn’t include RTP stream when preparing a
filter. Bug 13440[22].
• Wireshark installs on macOS with permissions for
/Library/Application Support/Wireshark that are too restrictive.
Bug 14335[23].
• Closing Enabled Protocols dialog crashes wireshark. Bug
14349[24].
• Unable to Export Objects → HTTP after sorting columns. Bug
14545[25].
• DNS Response to NS query shows as malformed packet. Bug
14574[26].
• Encrypted Alerts corresponds to a wrong selection in the packet
bytes pane. Bug 14712[27].
• Wireshark crashes/asserts with Qt 5.11.1 and assert/debugsymbols
enabled. Bug 15014[28].
• ESP will not decode since 2.6.2 - works fine in 2.4.6 or 2.4.8.
Bug 15056[29].
• text2pcap generates malformed packets when TCP, UDP or SCTP
headers are added together with IPv6 header. Bug 15194[30].
• Wireshark tries to decode EAP-SIM Pseudonym Identity. Bug
15196[31].
• Infinite read loop when extcap exits with error and error
message. Bug 15205[32].
• MATE unable to extract fields for PDU. Bug 15208[33].
• Malformed Packet: SV. Bug 15224[34].
• OPC UA Max nesting depth exceeded for valid packet. Bug
15226[35].
• TShark 2.6 does not print GeoIP information. Bug 15230[36].
• ISUP (ANSI) packets malformed in WS versions later than 2.4.8.
Bug 15236[37].
• Handover candidate enquire message not decoded. Bug 15237[38].
• TShark piping output in a cmd or PowerShell prompt stops working
when GeoIP is enabled. Bug 15248[39].
• ICMPv6 with routing header incorrectly placed. Bug 15270[40].
• IEEE 802.11 Vendor Specific fixed fields display as malformed
packets. Bug 15273[41].
• text2pcap -4 and -6 option should require -i as well. Bug
15275[42].
• text2pcap direction sensitivity does not affect dummy ethernet
addresses. Bug 15287[43].
• MLE security suite display incorrect. Bug 15288[44].
• Message for incorrect IPv4 option lengths is incorrect. Bug
15290[45].
• TACACS+ dissector does not properly reassemble large accounting
messages. Bug 15293[46].
• NLRI of S-PMSI A-D BGP route not being displayed. Bug 15307[47].
Updated Protocol Support
BGP, DCERPC, DCOM, DNS, EAP, ESP, GSM A BSSMAP, IEEE 802.11, IEEE
802.11 Radiotap, IPv4, IPv6, ISUP, LBMPDM, LISP, MLE, MMSE, OpcUa,
PVFS, SLL, SSL/TLS, SV, TACACS+, TCAP, Wi-SUN, XRA, and ZigBee ZCL
New and Updated Capture File Support
3GPP TS 32.423 Trace and IxVeriWave
New and Updated Capture Interfaces support
sshdump
Wireshark 2.6.5 Release Notes
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2018-51[1] The Wireshark dissection engine could crash.
Bug 14466[2]. CVE-2018-19625[3].
• wnpa-sec-2018-52[4] The DCOM dissector could crash. Bug 15130[5].
CVE-2018-19626[6].
• wnpa-sec-2018-53[7] The LBMPDM dissector could crash. Bug
15132[8]. CVE-2018-19623[9].
• wnpa-sec-2018-54[10] The MMSE dissector could go into an infinite
loop. Bug 15250[11]. CVE-2018-19622[12].
• wnpa-sec-2018-55[13] The IxVeriWave file parser could crash. Bug
15279[14]. CVE-2018-19627[15].
• wnpa-sec-2018-56[16] The PVFS dissector could crash. Bug
15280[17]. CVE-2018-19624[18].
• wnpa-sec-2018-57[19] The ZigBee ZCL dissector could crash. Bug
15281[20]. CVE-2018-19628[21].
The following bugs have been fixed:
• VoIP Calls dialog doesn’t include RTP stream when preparing a
filter. Bug 13440[22].
• Wireshark installs on macOS with permissions for
/Library/Application Support/Wireshark that are too restrictive.
Bug 14335[23].
• Closing Enabled Protocols dialog crashes wireshark. Bug
14349[24].
• Unable to Export Objects → HTTP after sorting columns. Bug
14545[25].
• DNS Response to NS query shows as malformed packet. Bug
14574[26].
• Encrypted Alerts corresponds to a wrong selection in the packet
bytes pane. Bug 14712[27].
• Wireshark crashes/asserts with Qt 5.11.1 and assert/debugsymbols
enabled. Bug 15014[28].
• ESP will not decode since 2.6.2 - works fine in 2.4.6 or 2.4.8.
Bug 15056[29].
• text2pcap generates malformed packets when TCP, UDP or SCTP
headers are added together with IPv6 header. Bug 15194[30].
• Wireshark tries to decode EAP-SIM Pseudonym Identity. Bug
15196[31].
• Infinite read loop when extcap exits with error and error
message. Bug 15205[32].
• MATE unable to extract fields for PDU. Bug 15208[33].
• Malformed Packet: SV. Bug 15224[34].
• OPC UA Max nesting depth exceeded for valid packet. Bug
15226[35].
• TShark 2.6 does not print GeoIP information. Bug 15230[36].
• ISUP (ANSI) packets malformed in WS versions later than 2.4.8.
Bug 15236[37].
• Handover candidate enquire message not decoded. Bug 15237[38].
• TShark piping output in a cmd or PowerShell prompt stops working
when GeoIP is enabled. Bug 15248[39].
• ICMPv6 with routing header incorrectly placed. Bug 15270[40].
• IEEE 802.11 Vendor Specific fixed fields display as malformed
packets. Bug 15273[41].
• text2pcap -4 and -6 option should require -i as well. Bug
15275[42].
• text2pcap direction sensitivity does not affect dummy ethernet
addresses. Bug 15287[43].
• MLE security suite display incorrect. Bug 15288[44].
• Message for incorrect IPv4 option lengths is incorrect. Bug
15290[45].
• TACACS+ dissector does not properly reassemble large accounting
messages. Bug 15293[46].
• NLRI of S-PMSI A-D BGP route not being displayed. Bug 15307[47].
Updated Protocol Support
BGP, DCERPC, DCOM, DNS, EAP, ESP, GSM A BSSMAP, IEEE 802.11, IEEE
802.11 Radiotap, IPv4, IPv6, ISUP, LBMPDM, LISP, MLE, MMSE, OpcUa,
PVFS, SLL, SSL/TLS, SV, TACACS+, TCAP, Wi-SUN, XRA, and ZigBee ZCL
New and Updated Capture File Support
3GPP TS 32.423 Trace and IxVeriWave
New and Updated Capture Interfaces support
sshdump