Wireshark 2.2.17 Release Notes __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New This is the final release of Wireshark 2.2. It will reach its official end of life on September 7, 2018. If you are still using Wireshark 2.2 you are encouraged to upgrade to Wireshark 2.6. Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2018-44 Bluetooth AVDTP dissector crash. [2]Bug 14884. [3]CVE-2018-16058. * [4]wnpa-sec-2018-45 Bluetooth Attribute Protocol dissector crash. [5]Bug 14994. [6]CVE-2018-16056. * [7]wnpa-sec-2018-46 Radiotap dissector crash. [8]Bug 15022. [9]CVE-2018-16057. The following bugs have been fixed: * udpdump frame too long error. [10]Bug 14989. * ASTERIX Category 062 / 135 Altitude has wrong value. [11]Bug 15030. * Wireshark cannot decrypt SSL/TLS session if it was proxied over HTTP tunnel. [12]Bug 15042. * TLS records in a HTTP tunnel are displayed as "Encrypted Handshake Message". [13]Bug 15043. * Diameter AVP User Location Info, Mobile Network Code decoded not correctly. [14]Bug 15068. * Heartbeat message "Info" displayed without comma separator. [15]Bug 15079. New and Updated Features There are no new features in this release. New File Format Decoding Support There are no new file formats in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ASTERIX, Bluetooth ATT, Bluetooth AVDTP, DTLS, E.212, HTTP, K12, and Radiotap New and Updated Capture File Support pcapng New and Updated Capture Interfaces support ciscodump Major API Changes There are no major API changes in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [16]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [17]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([18]Bug 1419) The BER dissector might infinitely loop. ([19]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([20]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([21]Bug 2234) Application crash when changing real-time option. ([22]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. ([23]Bug 4985) Wireshark should let you work with multiple capture files. ([24]Bug 10488) __________________________________________________________________ Getting Help Community support is available on [25]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [26]the web site. Official Wireshark training and certification are available from [27]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [28]Wireshark web site. __________________________________________________________________ Last updated 2018-08-29 16:24:12 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2018-44.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058 4. https://www.wireshark.org/security/wnpa-sec-2018-45.html 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056 7. https://www.wireshark.org/security/wnpa-sec-2018-46.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14989 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15030 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15042 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15043 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15068 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15079 16. https://www.wireshark.org/download.html 17. https://www.wireshark.org/download.html#thirdparty 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 25. https://ask.wireshark.org/ 26. https://www.wireshark.org/lists/ 27. http://www.wiresharktraining.com/ 28. https://www.wireshark.org/faq.html