ESB-2018.3716 - [Win][UNIX/Linux] Wireshark: Denial of service - Remote with user interaction 2018-11-29

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3716
                    Wireshark 2.4.11 and 2.6.5 released
                             29 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Wireshark
Publisher:         Wireshark
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19628 CVE-2018-19627 CVE-2018-19626
                   CVE-2018-19625 CVE-2018-19624 CVE-2018-19623
                   CVE-2018-19622  

Original Bulletin: 
   https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html
   https://www.wireshark.org/docs/relnotes/wireshark-2.6.5.html

Comment: This bulletin contains two (2) Wireshark security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

I'm proud to announce the release of Wireshark 2.4.11.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2018-51 The Wireshark dissection engine could crash.
       [2]Bug 14466. [3]CVE-2018-19625.
     * [4]wnpa-sec-2018-52 The DCOM dissector could crash. [5]Bug 15130.
       [6]CVE-2018-19626.
     * [7]wnpa-sec-2018-53 The LBMPDM dissector could crash. [8]Bug 15132.
       [9]CVE-2018-19623.
     * [10]wnpa-sec-2018-54 The MMSE dissector could go into an infinite
       loop. [11]Bug 15250. [12]CVE-2018-19622.
     * [13]wnpa-sec-2018-55 The IxVeriWave file parser could crash.
       [14]Bug 15279. [15]CVE-2018-19627.
     * [16]wnpa-sec-2018-56 The PVFS dissector could crash. [17]Bug 15280.
       [18]CVE-2018-19624.

   The following bugs have been fixed:
     * VoIP Calls dialog doesn't include RTP stream when preparing a
       filter. [19]Bug 13440.
     * Wireshark installs on macOS with permissions for
       /Library/Application Support/Wireshark that are too restrictive.
       [20]Bug 14335.
     * Closing Enabled Protocols dialog crashes wireshark. [21]Bug 14349.
     * Encrypted Alerts corresponds to a wrong selection in the packet
       bytes pane. [22]Bug 14712.
     * MATE unable to extract fields for PDU. [23]Bug 15208.
     * Malformed Packet: SV. [24]Bug 15224.
     * ISUP (ANSI) packets malformed in WS versions later than 2.4.8.
       [25]Bug 15236.
     * Handover candidate enquire message not decoded. [26]Bug 15237.
     * MLE security suite display incorrect. [27]Bug 15288.
     * Message for incorrect IPv4 option lengths is incorrect. [28]Bug
       15290.
     * TACACS+ dissector does not properly reassemble large accounting
       messages. [29]Bug 15293.
     * NLRI of S-PMSI A-D BGP route not being displayed. [30]Bug 15307.

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   BGP, DCOM, GSM A BSSMAP, IEEE 802.11 Radiotap, ISUP, LBMPDM, LISP, MLE,
   MMSE, PVFS, SLL, SSL/TLS, SV, and TACACS+

  New and Updated Capture File Support

   3GPP TS 32.423 Trace, and IxVeriWave

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [31]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [32]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([33]Bug 1419)

   The BER dissector might infinitely loop. ([34]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([35]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([36]Bug 2234)

   Application crash when changing real-time option. ([37]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([38]Bug 4985)

   Wireshark should let you work with multiple capture files. ([39]Bug
   10488)
     __________________________________________________________________

Getting Help

   Community support is available on [40]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [41]the web site.

   Official Wireshark training and certification are available from
   [42]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [43]Wireshark web site.
     __________________________________________________________________

   Last updated 2018-11-28 18:14:29 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2018-51.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625
   4. https://www.wireshark.org/security/wnpa-sec-2018-52.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626
   7. https://www.wireshark.org/security/wnpa-sec-2018-53.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
   9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623
  10. https://www.wireshark.org/security/wnpa-sec-2018-54.html
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
  12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622
  13. https://www.wireshark.org/security/wnpa-sec-2018-55.html
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
  15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627
  16. https://www.wireshark.org/security/wnpa-sec-2018-56.html
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
  18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13440
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14335
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14349
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14712
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15208
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15224
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15236
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15237
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15288
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15290
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15293
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15307
  31. https://www.wireshark.org/download.html
  32. https://www.wireshark.org/download.html#thirdparty
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  40. https://ask.wireshark.org/
  41. https://www.wireshark.org/lists/
  42. http://www.wiresharktraining.com/
  43. https://www.wireshark.org/faq.html


Digests

wireshark-2.4.11.tar.xz: 29125808 bytes
SHA256(wireshark-2.4.11.tar.xz)=f52f0ad49ae13bd38efe3bfe8f6abccd171426d381b1523a94e96a82cbf30c05
RIPEMD160(wireshark-2.4.11.tar.xz)=2f995e8a6866058d0d1b822b9896827465a0081a
SHA1(wireshark-2.4.11.tar.xz)=99f3a54a62b0034568b770e684721c5d08345a10

Wireshark-win32-2.4.11.exe: 52782872 bytes
SHA256(Wireshark-win32-2.4.11.exe)=398448accf7f53b8152d96008572fbf7d621e82e05fb19296b1114100fa4cdc7
RIPEMD160(Wireshark-win32-2.4.11.exe)=7a7e3cfbcaaa6bd95063ab10baaa3dfbb3edeab7
SHA1(Wireshark-win32-2.4.11.exe)=a4c005172ae8a4dee0905f6ff814e1a66ee740fc

Wireshark-win64-2.4.11.exe: 57990664 bytes
SHA256(Wireshark-win64-2.4.11.exe)=a9d7cb41f70d87ebb44a724f7ca0faa14703c7c3041d1f67de020914a4fee364
RIPEMD160(Wireshark-win64-2.4.11.exe)=fe142f31cf39dadd2cc1b36dd8658a32d8edba75
SHA1(Wireshark-win64-2.4.11.exe)=18f46f6898e3a7df180135e6b94607aa11de713f

Wireshark-win64-2.4.11.msi: 47079424 bytes
SHA256(Wireshark-win64-2.4.11.msi)=90a3a042849bc4ce4847b11eed1423e9f45353ffee87a5c4c7f29f726621e0e4
RIPEMD160(Wireshark-win64-2.4.11.msi)=606930c393b0a9ed0a9d98cb48d9cb2df5b35c4d
SHA1(Wireshark-win64-2.4.11.msi)=3bcccac8357dc5ae13f63a7000616bb86fb50a75

Wireshark-win32-2.4.11.msi: 42020864 bytes
SHA256(Wireshark-win32-2.4.11.msi)=d0cdc713970edc2246b80190f9038640db280022f187aba86419d71e77251960
RIPEMD160(Wireshark-win32-2.4.11.msi)=d595942e2aa8a9ff4b91426e11a67339ef3f70a8
SHA1(Wireshark-win32-2.4.11.msi)=070e27e193a2763dbb74a61b9efe4f3bc03a1da8

WiresharkPortable_2.4.11.paf.exe: 45457984 bytes
SHA256(WiresharkPortable_2.4.11.paf.exe)=8837fa50858b67f795f9e2be371a48d90c33cd1c2947f0a3b5bf0b8dc40d5720
RIPEMD160(WiresharkPortable_2.4.11.paf.exe)=72f0a557a170ceb6f01a568a3f054637f78ba8a9
SHA1(WiresharkPortable_2.4.11.paf.exe)=b023d96282013f399e5d47ba2c67084c2b3f0a9e

Wireshark 2.4.11 Intel 64.dmg: 42556967 bytes
SHA256(Wireshark 2.4.11 Intel
64.dmg)=6ff54e202470659ece4cfd9b361cf5d0bb5bcbbca1df5aec62adeeadb9e96d3f
RIPEMD160(Wireshark 2.4.11 Intel
64.dmg)=0d5d3fd2abac735217685afea19090dbb0027cc0
SHA1(Wireshark 2.4.11 Intel 64.dmg)=7f4a5ab7458b36b66a722d0e5069ecdd9745b73e

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

- ---------------------------------------------------------------------------

I'm proud to announce the release of Wireshark 2.6.5.


 What is Wireshark-

  Wireshark is the world's most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What's New

    o The Windows installers now ship with Qt 5.9.7. Previously they
      shipped with Qt 5.9.5.

  Bug Fixes

   The following vulnerabilities have been fixed:

     o wnpa-sec-2018-51[1] The Wireshark dissection engine could crash.
       Bug 14466[2]. CVE-2018-19625[3].

     o wnpa-sec-2018-52[4] The DCOM dissector could crash. Bug 15130[5].
       CVE-2018-19626[6].

     o wnpa-sec-2018-53[7] The LBMPDM dissector could crash. Bug
       15132[8]. CVE-2018-19623[9].

     o wnpa-sec-2018-54[10] The MMSE dissector could go into an infinite
       loop. Bug 15250[11]. CVE-2018-19622[12].

     o wnpa-sec-2018-55[13] The IxVeriWave file parser could crash. Bug
       15279[14]. CVE-2018-19627[15].

     o wnpa-sec-2018-56[16] The PVFS dissector could crash. Bug
       15280[17]. CVE-2018-19624[18].

     o wnpa-sec-2018-57[19] The ZigBee ZCL dissector could crash. Bug
       15281[20]. CVE-2018-19628[21].

   The following bugs have been fixed:

     o VoIP Calls dialog doesn't include RTP stream when preparing a
       filter. Bug 13440[22].

     o Wireshark installs on macOS with permissions for
       /Library/Application Support/Wireshark that are too restrictive.
       Bug 14335[23].

     o Closing Enabled Protocols dialog crashes wireshark. Bug
       14349[24].

     o Unable to Export Objects -> HTTP after sorting columns. Bug
       14545[25].

     o DNS Response to NS query shows as malformed packet. Bug
       14574[26].

     o Encrypted Alerts corresponds to a wrong selection in the packet
       bytes pane. Bug 14712[27].

     o Wireshark crashes/asserts with Qt 5.11.1 and assert/debugsymbols
       enabled. Bug 15014[28].

     o ESP will not decode since 2.6.2 - works fine in 2.4.6 or 2.4.8.
       Bug 15056[29].

     o text2pcap generates malformed packets when TCP, UDP or SCTP
       headers are added together with IPv6 header. Bug 15194[30].

     o Wireshark tries to decode EAP-SIM Pseudonym Identity. Bug
       15196[31].

     o Infinite read loop when extcap exits with error and error
       message. Bug 15205[32].

     o MATE unable to extract fields for PDU. Bug 15208[33].

     o Malformed Packet: SV. Bug 15224[34].

     o OPC UA Max nesting depth exceeded for valid packet. Bug
       15226[35].

     o TShark 2.6 does not print GeoIP information. Bug 15230[36].

     o ISUP (ANSI) packets malformed in WS versions later than 2.4.8.
       Bug 15236[37].

     o Handover candidate enquire message not decoded. Bug 15237[38].

     o TShark piping output in a cmd or PowerShell prompt stops working
       when GeoIP is enabled. Bug 15248[39].

     o ICMPv6 with routing header incorrectly placed. Bug 15270[40].

     o IEEE 802.11 Vendor Specific fixed fields display as malformed
       packets. Bug 15273[41].

     o text2pcap -4 and -6 option should require -i as well. Bug
       15275[42].

     o text2pcap direction sensitivity does not affect dummy ethernet
       addresses. Bug 15287[43].

     o MLE security suite display incorrect. Bug 15288[44].

     o Message for incorrect IPv4 option lengths is incorrect. Bug
       15290[45].

     o TACACS+ dissector does not properly reassemble large accounting
       messages. Bug 15293[46].

     o NLRI of S-PMSI A-D BGP route not being displayed. Bug 15307[47].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   BGP, DCERPC, DCOM, DNS, EAP, ESP, GSM A BSSMAP, IEEE 802.11, IEEE
   802.11 Radiotap, IPv4, IPv6, ISUP, LBMPDM, LISP, MLE, MMSE, OpcUa,
   PVFS, SLL, SSL/TLS, SV, TACACS+, TCAP, Wi-SUN, XRA, and ZigBee ZCL

  New and Updated Capture File Support

   3GPP TS 32.423 Trace and IxVeriWave

  New and Updated Capture Interfaces support

   sshdump

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html[48].

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[49] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About->Folders to
  find the default locations on your system.

 Known Problems

  The BER dissector might infinitely loop. Bug 1516[50].

  Capture filters aren't applied when capturing from named pipes. Bug
  1814[51].

  Filtering tshark captures with read filters (-R) no longer works. Bug
  2234[52].

  Application crash when changing real-time option. Bug 4035[53].

  Wireshark and TShark will display incorrect delta times in some cases.
  Bug 4985[54].

  Wireshark should let you work with multiple capture files. Bug
  10488[55].

 Getting Help

  Community support is available on Wireshark's Q&A site[56] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark's mailing lists can be found on the web site[57].

  Official Wireshark training and certification are available from
  Wireshark University[58].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[59].

  Last updated 2018-11-28 18:12:37 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2018-51
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=14466
   3. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19625
   4. https://www.wireshark.org/security/wnpa-sec-2018-52
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15130
   6. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19626
   7. https://www.wireshark.org/security/wnpa-sec-2018-53
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15132
   9. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19623
  10. https://www.wireshark.org/security/wnpa-sec-2018-54
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15250
  12. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19622
  13. https://www.wireshark.org/security/wnpa-sec-2018-55
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15279
  15. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19627
  16. https://www.wireshark.org/security/wnpa-sec-2018-56
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15280
  18. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19624
  19. https://www.wireshark.org/security/wnpa-sec-2018-57
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15281
  21. https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2018-19628
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=13440
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=14335
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=14349
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=14545
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=14574
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=14712
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15014
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15056
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15194
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15196
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15205
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15208
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15224
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15226
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15230
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15236
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15237
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15248
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15270
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15273
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15275
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15287
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15288
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15290
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15293
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=15307
  48. https://www.wireshark.org/download.html
  49. https://www.wireshark.org/download.html#thirdparty
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=1516
  51. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=1814
  52. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=2234
  53. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=4035
  54. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=4985
  55. https://bugs.wireshark.org/bugzilla/show_bug.cgi-id=10488
  56. https://ask.wireshark.org/
  57. https://www.wireshark.org/lists/
  58. http://www.wiresharktraining.com/
  59. https://www.wireshark.org/faq.html


Digests

wireshark-2.6.5.tar.xz: 28390292 bytes
SHA256(wireshark-2.6.5.tar.xz)=93155b798544b2f07693920f4ac1b531c952965ee4eb1d98419961240177438a
RIPEMD160(wireshark-2.6.5.tar.xz)=0f840f0ef8747ba808ac17660bb54f3ff9dfdc4b
SHA1(wireshark-2.6.5.tar.xz)=556a8e084230e6359c86daf578d25c6f443458bb

Wireshark-win32-2.6.5.exe: 53798712 bytes
SHA256(Wireshark-win32-2.6.5.exe)=9c9a459cec8866b82f68e35d6376d6d121123f3551bd83a17b36193e32828d2f
RIPEMD160(Wireshark-win32-2.6.5.exe)=7e7a667c9169075f23bf28b4b39604396a89b529
SHA1(Wireshark-win32-2.6.5.exe)=333556211a0e48eff4778404b809d3fb49414b8b

Wireshark-win64-2.6.5.exe: 59537312 bytes
SHA256(Wireshark-win64-2.6.5.exe)=1ee5afdc18efda2781a88da6a360a28ae88feaaecdc7c3246fb98767abcc7654
RIPEMD160(Wireshark-win64-2.6.5.exe)=65e9962f4c52af124a657e157fb91ee303affa2e
SHA1(Wireshark-win64-2.6.5.exe)=126b32d7e11bfb42b86c87920ea231e213defc5c

Wireshark-win32-2.6.5.msi: 43286528 bytes
SHA256(Wireshark-win32-2.6.5.msi)=a63cbb2da79ef80ae8855ef4cfbd92285de9655833e2dd1897d84cdb83246141
RIPEMD160(Wireshark-win32-2.6.5.msi)=8ebabf8958167bd68a69a754cc36a0f008a1b354
SHA1(Wireshark-win32-2.6.5.msi)=1b74d74a9c9d54d7507be198c891ab00905931f6

Wireshark-win64-2.6.5.msi: 48926720 bytes
SHA256(Wireshark-win64-2.6.5.msi)=3882cabc355ee298e4a8e6940cc67c286c349b85e76dfc63fe532f0555cba004
RIPEMD160(Wireshark-win64-2.6.5.msi)=d49c115e92373529049e7689ba693e8101dad9de
SHA1(Wireshark-win64-2.6.5.msi)=0433bbf10eef0b0d8949a6145c4ebcfdfbf49e6a

WiresharkPortable_2.6.5.paf.exe: 37034016 bytes
SHA256(WiresharkPortable_2.6.5.paf.exe)=2c6e3831da69c840f7904deb05542984c03f0de9d3979487ef7a557308c3b1a6
RIPEMD160(WiresharkPortable_2.6.5.paf.exe)=214876b0f4b7a8f7fac79591b777fad243c6e5c6
SHA1(WiresharkPortable_2.6.5.paf.exe)=f52d430442028a2d1da33c0fad98e353128f8f10

Wireshark 2.6.5 Intel 64.dmg: 168574656 bytes
SHA256(Wireshark 2.6.5 Intel
64.dmg)=b4e2cb6c9ddb0f700ef8eaba9f19248f92069a27622620646f46640e294c678f
RIPEMD160(Wireshark 2.6.5 Intel
64.dmg)=93e33202129eb42165324451e6065b62560c76ab
SHA1(Wireshark 2.6.5 Intel 64.dmg)=0b0cef24d1b1d5aaf13f6b918c24e187aac6a8b9

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW/99R2aOgq3Tt24GAQg9XQ/+NwNoSlqhsu7wLWVaXA9JmqHs1qECzyq1
LWlwajXfnVyr4ReJXV3HDfMbcwhT5/+7unQwUuFTTLlRh5WO769IGgGvWUQsafgW
QPh5DjzBuWuIk5E5i+bmSDSZdMmSTc0CLozHMp3nuVbDg1hQwTfj20dHT4iaLoUd
+r+eUsaug2ll1p4afYBmAgyaa5gKLqY3UGtFrNcZxlGUIpjK8SAKs0W6sOaVnlXD
hFIpjRXS+dixREiLYMc78vMTPGQ39WiuIw0N7TwMTzCrfDuc6ePI54gGYebqAF1p
FXIka9ZeQp6+3zBM+gvq4yqGRm5fKxMXHwdoLgcyq+ZHRYd3ME5ofd2U3l3r1W/T
8aIltAtYUEhKcvHxzHt2X0eq79bQKhLF62wfZvoZEk1mjEM2R3tG9SZJG350bvOD
ecYgGVNsCXYiuQMztHLmam6PHi40IShHwOGK8w4RUhV8hnjQWkQSgAmyFMqeWIDD
GwjrxNpxO+3LvpQfVLNESnv6YD+7QXExDBj7ZE26MeWIZ3fPHjhVF1oZaAapvUvI
dkFi1eb5SngBjxVMpiLm+GNoR5VD6s/lNa7YFupzZkqLonD0KnnxR0OUm77wW7O3
KZDAcYd5wjF9xqOKCiz0KsJFIc9z4HlyO+/uA1PmuyeMdn26EttFlTi2xnvNh82P
OHkroUCV2kU=
=LPmw
-----END PGP SIGNATURE-----

« Back to bulletins