                    Wireshark 1.10.10 Release Notes
     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2014-12
       RTP dissector crash. ([2]Bug 9920) [3]CVE-2014-6421
       [4]CVE-2014-6422
     * [5]wnpa-sec-2014-13
       MEGACO dissector infinite loop. ([6]Bug 10333)
       [7]CVE-2014-6423
     * [8]wnpa-sec-2014-14
       Netflow dissector crash. ([9]Bug 10370) [10]CVE-2014-6424
     * [11]wnpa-sec-2014-17
       RTSP dissector crash. ([12]Bug 10381) [13]CVE-2014-6427
     * [14]wnpa-sec-2014-18
       SES dissector crash. ([15]Bug 10454) [16]CVE-2014-6428
     * [17]wnpa-sec-2014-19
       Sniffer file parser crash. ([18]Bug 10461)
       [19]CVE-2014-6429 [20]CVE-2014-6430 [21]CVE-2014-6431
       [22]CVE-2014-6432

   The following bugs have been fixed:
     * Wireshark can crash during remote capture (rpcap)
       configuration. ([23]Bug 3554, [24]Bug 6922,
       ws-buglink:7021)
     * MIPv6 Service Selection Identifier parse error. ([25]Bug
       10323)
     * 802.11 BA sequence number decode is broken. ([26]Bug 10334)
     * TRILL NLPID 0xc0 unknown to Wireshark. ([27]Bug 10382)
     * Wrong decoding of RPKI RTR End of Data PDU. ([28]Bug 10411)
     * Misparsed NTP control assignments with empty values.
       ([29]Bug 10417)
     * 6LoWPAN multicast address decompression problems. ([30]Bug
       10426)
     * GUI Hangs when Selecting Path to GeoIP Files. ([31]Bug
       10434)
     * 6LoWPAN context handling not working. ([32]Bug 10443)
     * SIP: When export to a CSV, Info is changed to differ.
       ([33]Bug 10453)
     * Typo in packet-netflow.c. ([34]Bug 10458)
     * UCP dissector bug of operation 30 - data not decoded.
       ([35]Bug 10464)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   6LoWPAN, DVB-CI, IEEE 802.11, MEGACO, MIPv6, Netflow, NTP, OSI,
   RPKI RTR, RTP, RTSP, SES, SIP, and UCP

  New and Updated Capture File Support

   DOS Sniffer, and NetScaler
     __________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available
   from [36]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [37]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([38]Bug
   1419)

   The BER dissector might infinitely loop. ([39]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([40]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([41]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([42]Win64 development page)

   Resolving ([43]Bug 9044) reopens ([44]Bug 3528) so that
   Wireshark no longer automatically decodes gzip data when
   following a TCP stream.

   Application crash when changing real-time option. ([45]Bug
   4035)

   Hex pane display issue after startup. ([46]Bug 4056)

   Packet list rows are oversized. ([47]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([48]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([49]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [50]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [51]the web site.

   Official Wireshark training and certification are available
   from [52]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [53]Wireshark web site.
     __________________________________________________________

   Last updated 2014-09-16 08:49:57 PDT

References

   1. https://www.wireshark.org/security/wnpa-sec-2014-12.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421
   4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422
   5. https://www.wireshark.org/security/wnpa-sec-2014-13.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10333
   7. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423
   8. https://www.wireshark.org/security/wnpa-sec-2014-14.html
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10370
  10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424
  11. https://www.wireshark.org/security/wnpa-sec-2014-17.html
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381
  13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427
  14. https://www.wireshark.org/security/wnpa-sec-2014-18.html
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10454
  16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428
  17. https://www.wireshark.org/security/wnpa-sec-2014-19.html
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
  19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429
  20. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430
  21. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431
  22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3554
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6922
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10323
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10334
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10382
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10411
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10417
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10426
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10434
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10443
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10453
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10458
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10464
  36. http://www.wireshark.org/download.html
  37. http://www.wireshark.org/download.html#thirdparty
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  42. https://wiki.wireshark.org/Development/Win64
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  50. http://ask.wireshark.org/
  51. http://www.wireshark.org/lists/
  52. http://www.wiresharktraining.com/
  53. http://www.wireshark.org/faq.html
