Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark 1.8.10 Release Notes


What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education.

What's New

Bug Fixes

The following vulnerabilities have been fixed.

  • wnpa-sec-2013-55

    The NBAP dissector could crash. Discovered by Laurent Butti. (Bug 9005)

    Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.

  • wnpa-sec-2013-56

    The ASSA R3 dissector could go into an infinite loop. Discovered by Ben Schmidt. (Bug 9020 )

    Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.

  • wnpa-sec-2013-57

    The RTPS dissector could overflow a buffer. Discovered by Ben Schmidt. (Bug 9019 )

    Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.

  • wnpa-sec-2013-58

    The MQ dissector could crash. (Bug 9079 )

    Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.

  • wnpa-sec-2013-59

    The LDAP dissector could crash.

    Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.

  • wnpa-sec-2013-60

    The Netmon file parser could crash. Discovered by G. Geshev. (Bug 8742 )

    Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.

The following bugs have been fixed:

  • Lua ByteArray:append() causes wireshark crash. (Bug 4461)

  • Lua script can not get "data-text-lines" protocol data. (Bug 5200)

  • PER normally small non-negative whole number decoding is wrong when >= 64. (Bug 8841)

  • Incorrect parsing of IPFIX *IpTotalLength elements. (Bug 8918)

  • IO graph/advanced, max/min/summ error on frames with multiple Diameter messages. (Bug 8980)

  • Wireshark fails to decode single-line, multiple Contact: URIs in SIP responses. (Bug 9031)

  • Dissector for EtherCAT: ADS highlighting in the Packet Bytes Pane is incorrect. (Bug 9036)

  • 802.11 HT Extended Capabilities B10 decode incorrect. (Bug 9038)

  • Weird malformed HTTP error. (Bug 9101)

New and Updated Features

There are no new features in this release.

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

ASSA R3, EtherCAT AMS, GTPv2, HTTP, IEEE 802.11, IPFIX, LDAP, MQ, NBAP, NCP SSS, RTPS, SIP,

New and Updated Capture File Support

.

Getting Wireshark

Wireshark source code and installation packages are available from http://www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system.

Known Problems

Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

The BER dissector might infinitely loop. (Bug 1516)

Capture filters aren't applied when capturing from named pipes. (Bug 1814)

Filtering tshark captures with display filters (-R) no longer works. (Bug 2234)

The 64-bit Windows installer does not support Kerberos decryption. (Win64 development page)

Application crash when changing real-time option. (Bug 4035)

Hex pane display issue after startup. (Bug 4056)

Packet list rows are oversized. (Bug 4357)

Summary pane selected frame highlighting not maintained. (Bug 4445)

Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985)

Getting Help

Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site.

Official Wireshark training and certification are available from Wireshark University.

Frequently Asked Questions

A complete FAQ is available on the Wireshark web site.