                     Wireshark 1.10.8 Release Notes
     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2014-07
       The frame metadissector could crash. ([2]Bug 9999, [3]Bug
       10030)
       Versions affected: 1.10.0 to 1.10.7
       [4]CVE-2014-4020

   The following bugs have been fixed:
     * VoIP flow graph crash upon opening. ([5]Bug 9179)
     * Tshark with "-F pcap" still generates a pcapng file.
       ([6]Bug 9991)
     * IPv6 Next Header 0x3d recognized as SHIM6. ([7]Bug 9995)
     * Failed to export pdml on large pcap. ([8]Bug 10081)
     * TCAP: set a fence on info column after calling sub
       dissector ([9]Bug 10091)
     * Dissector bug in JSON protocol. ([10]Bug 10115)
     * GSM RLC MAC: do not skip too many lines of the CSN_DESCR
       when the field is missing ([11]Bug 10120)
     * Wireshark PEEKREMOTE incorrectly decoding QoS data packets
       from Cisco Sniffer APs. ([12]Bug 10139)
     * IEEE 802.11: fix dissection of HT Capabilities ([13]Bug
       10166)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   CIP, EtherNet/IP, GSM RLC MAC, IEEE 802.11, IPv6, and TCAP

  New and Updated Capture File Support

   pcap-ng, and PEEKREMOTE
     __________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available
   from [14]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [15]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([16]Bug
   1419)

   The BER dissector might infinitely loop. ([17]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([18]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([19]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([20]Win64 development page)

   Resolving ([21]Bug 9044) reopens ([22]Bug 3528) so that
   Wireshark no longer automatically decodes gzip data when
   following a TCP stream.

   Application crash when changing real-time option. ([23]Bug
   4035)

   Hex pane display issue after startup. ([24]Bug 4056)

   Packet list rows are oversized. ([25]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([26]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([27]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [28]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [29]the web site.

   Official Wireshark training and certification are available
   from [30]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [31]Wireshark web site.
     __________________________________________________________

   Last updated 2014-06-12 12:06:58 PDT

References

   1. https://www.wireshark.org/security/wnpa-sec-2014-07.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9999
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10030
   4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4020
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9179
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9991
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9995
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10081
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10091
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10115
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10120
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10139
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10166
  14. http://www.wireshark.org/download.html
  15. http://www.wireshark.org/download.html#thirdparty
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  20. https://wiki.wireshark.org/Development/Win64
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  28. http://ask.wireshark.org/
  29. http://www.wireshark.org/lists/
  30. http://www.wiresharktraining.com/
  31. http://www.wireshark.org/faq.html
