Wireshark 3.2.1 Release Notes

 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2020-01[1] WASSP dissector crash. Bug 16324[2].
       CVE-2020-7044[3].

   The following bugs have been fixed:

     • Incorrect parsing of USB CDC packets. Bug 14587[4].

     • Wireshark fails to create directory if parent directory does not
       yet exist. Bug 16143[5].

     • Buildbot crash output: randpkt-2019-11-30-22633.pcap. Bug
       16240[6].

     • Closing Flow Graph closes (crashes) main GUI window. Bug
       16260[7].

     • Wireshark interprets websocket frames after HTTP handshake in a
       wrong way. Bug 16274[8].

     • A-bis/OML: IPA Destination IP Address attribute contains inverted
       value (endianness). Bug 16282[9].

     • wiretap/log3gpp.c: 2 * leap before looking ?. Bug 16283[10].

     • Opening shell terminal prints Wireshark: Permission denied. Bug
       16284[11].

     • h264: SPS frame_crop_right_offset shown in UI as
       frame_crop_left_offset. Bug 16285[12].

     • BGP: update of "Sub-TLV Length" by draft-ietf-idr-tunnel-encaps.
       Bug 16294[13].

     • SPNEGO+GSS-API+Kerberos+ap-options dissection produces "Unknown
       Bit(s)" expert message. Bug 16301[14].

     • USB Audio feature unit descriptor is incorrectly dissected. Bug
       16305[15].

     • Compiling the .y files fails with Berkeley YACC. Bug 16306[16].

     • PDB files in Windows installer. Bug 16307[17].

     • NAS-5GS 5GS network feature support lacks MCSI, EMCN3 two fields
       (octet 4). Bug 16310[18].

     • Option to change “Packet List” columns header right click pop-up
       menu behavior. Bug 16317[19].

     • DLT: Dissector does not parse multiple DLT messages in single UDP
       packet. Bug 16321[20].

     • ISAKMP Dissection: Enhance Source id and Destination ID field of
       GDOI SA TEK payload for non IP ID type. Bug 16233[21].

     • DOIP: Typo in "identifcation request messages". Bug 16325[22].

     • Toolbar "?" help button - no text/help displayed. Bug 16327[23].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   802.11 Radiotap, ASN.1 BER, BGP, DLT, DOIP, GSM A RR, GSM A-bis/OML,
   H264, HTTP, IEC 60870-5-104, IEEE 802.11, IPv4, ISAKMP, NAS 5GS,
   rtnetlink, SIP, TIPC, USB Audio, USB CDC, and WASSP

  New and Updated Capture File Support

   3gpp phone log

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[24] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About→Folders to
  find the default locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[25] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[26].

  Bugs and feature requests can be reported on the bug tracker[27].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[28].

  Last updated 2020-01-15 17:51:08 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2020-01
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16324
   3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14587
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16143
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16240
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16260
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16274
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16282
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16283
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16284
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16285
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16294
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16301
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16305
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16306
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16307
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16310
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16317
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16321
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16233
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16325
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16327
  24. https://www.wireshark.org/download.html#thirdparty
  25. https://ask.wireshark.org/
  26. https://www.wireshark.org/lists/
  27. https://bugs.wireshark.org/
  28. https://www.wireshark.org/faq.html
