e170fa85ff
- Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. o The NFS dissector could crash on Windows. (Bug 5209) Versions affected: 1.4.0 to 1.4.4. o The X.509if dissector could crash. (Bug 5754, Bug 5793) Versions affected: 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4. o Paul Makowski from SEI/CERT discovered that the DECT dissector could overflow a buffer. He verified that this could allow remote code execution on many platforms. Versions affected: 1.4.0 to 1.4.4. The following bugs have been fixed: o Export HTTP > All - System Appears Hung (but isn't). (Bug 1671) o Some HTTP responses don't decode with TCP reassembly on. (Bug 3785) o Wireshark crashes when cancelling a large sort operation. (Bug 5189) o Wireshark crashes if SSL preferences RSA key is actually a DSA key. (Bug 5662) o tshark incorrectly calculates TCP stream for some syn packets. (Bug 5743) o Wireshark not able to decode the PPP frame in a sflow (RFC3176) flow sample packet because Wireshark incorrectly read the protocol in PPP frame header. (Bug 5746) o Mysql protocol dissector: all fields should be little endian. (Bug 5759) o Error when opening snoop from Juniper SSG-140. (Bug 5762) o svnversion: command not found. (Bug 5798) o capinfos: #ifdef HAVE_LIBGCRYPT block includes a line too many. (Bug 5803) o Value of TCP segment data cannot be copied. (Bug 5811) o proto_field_is_referenced() is not exported in libwireshark.dll. (Bug 5816) o Wireshark ver. 1.4.4 not displayed "Granted QoS" field in a A11 packet. (Bug 5822) - Updated Protocol Support HTTP, LDAP, MySQL, NFS, sFlow, SSL, TCP |
||
---|---|---|
.. | ||
patches | ||
DESCR | ||
distinfo | ||
Makefile | ||
options.mk | ||
PLIST |