-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1785
                        Multiple Wireshark releases
                                20 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Wireshark
Publisher:         Wireshark
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://www.wireshark.org/lists/wireshark-announce/202005/msg00000.html
   https://www.wireshark.org/lists/wireshark-announce/202005/msg00001.html
   https://www.wireshark.org/lists/wireshark-announce/202005/msg00002.html

Comment: This bulletin contains three (3) Wireshark security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Wireshark 2.6.17 is now available

I'm proud to announce the release of Wireshark 2.6.17.


 What is Wireshark?

  Wireshark is the world's most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What's New

  Bug Fixes

     o wnpa-sec-2020-08[1] The NFS dissector could crash. Bug 16476[2].

   The following bugs have been fixed:

     o PVS-Studio analyser long list of issues. Bug 16335[3].

     o pcapng file dissector incorrectly computes nanoseconds from
       timestamps because it assumes the resolution is in nanoseconds.
       Bug 16440[4].

     o Read of uninitialized memory in detect_camins_file. Bug 16458[5].

     o Read of uninitialized memory in lanalyzer_read_trace_record. Bug
       16459[6].

     o capinfos "Capture duration" output is truncated if there are more
       than 11 digits of seconds and fractions of a second. Bug
       16519[7].

     o MIME Files Format/pcapng: Simple Packet Block parsed incorrectly.
       Bug 16526[8].

     o Buildbot crash output: fuzz-2020-05-13-12195.pcap. Bug 16564[9].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   AoE, APRS, ASN.1 BER, FTP, GSM SMS, Infiniband, ISObus VT, MAC LTE,
   NFS, ONC RPC, OSC, pcapng, PDCP LTE, RADIUS, RLC LTE, SDP, SIP,
   Snort, and STUN

  New and Updated Capture File Support

   Camins, Catapult DCT 2000, Lanalyzer, and MPEG

  New and Updated Capture Interfaces support

   There is no new or updated capture file support in this release.

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[10] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About->Folders to
  find the default locations on your system.

 Known Problems

  The BER dissector might infinitely loop. Bug 1516[11].

  Capture filters aren't applied when capturing from named pipes. Bug
  1814[12].

  Filtering tshark captures with read filters (-R) no longer works. Bug
  2234[13].

  Application crash when changing real-time option. Bug 4035[14].

  Wireshark and TShark will display incorrect delta times in some cases.
  Bug 4985[15].

  Wireshark should let you work with multiple capture files. Bug
  10488[16].

 Getting Help

  Community support is available on Wireshark's Q&A site[17] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark's mailing lists can be found on the web site[18].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[19].

  Last updated 2020-05-19 18:38:34 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2020-08
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16335
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16440
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16458
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16459
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16519
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16526
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16564
  10. https://www.wireshark.org/download.html#thirdparty
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  17. https://ask.wireshark.org/
  18. https://www.wireshark.org/lists/
  19. https://www.wireshark.org/faq.html


Digests

wireshark-2.6.17.tar.xz: 28523700 bytes
SHA256(wireshark-2.6.17.tar.xz)=eb37fa54f35ca56fa3532d4cf391c0600e1d068f6c1503918024c553d8067eff
RIPEMD160(wireshark-2.6.17.tar.xz)=62e7d2bf5d76a13a22cd60dff7246b1989ac9e5d
SHA1(wireshark-2.6.17.tar.xz)=8bdf29a621b848a9d3ce368855077625cc01752e

Wireshark-win64-2.6.17.exe: 59709416 bytes
SHA256(Wireshark-win64-2.6.17.exe)=ede67647da0b1c103e9ce192dd91927c9931c0b277db812324166585e18fd09a
RIPEMD160(Wireshark-win64-2.6.17.exe)=42eace40cf314896b8535e5085d9b7171ab75ffb
SHA1(Wireshark-win64-2.6.17.exe)=2c3b66ace5bfd1c0e741940d9b3abafe5f967663

Wireshark-win32-2.6.17.exe: 54072136 bytes
SHA256(Wireshark-win32-2.6.17.exe)=b72fb88ecf385e23fdb028dcc66c623d5eeff03fc226b9735907355e44194d21
RIPEMD160(Wireshark-win32-2.6.17.exe)=a0f2905242f5f7afa8e951ae00ab50442dd16280
SHA1(Wireshark-win32-2.6.17.exe)=a9dedf08861fa5431745a30bbca25c4012c32ff2

Wireshark-win64-2.6.17.msi: 49172480 bytes
SHA256(Wireshark-win64-2.6.17.msi)=508b7b5372e8b086bebd628ffbe9be7525881515ebdb8b5e3fd8e956065517b8
RIPEMD160(Wireshark-win64-2.6.17.msi)=7dcc2def1739adcbede2fb4c0e72221eafbd73df
SHA1(Wireshark-win64-2.6.17.msi)=8e04d1e4b03a6ee102619af7be809f2fa35464f7

Wireshark-win32-2.6.17.msi: 43577344 bytes
SHA256(Wireshark-win32-2.6.17.msi)=bd4243fcb9becea3f05c71641cfc314718d59b3c96de4ca60f326b7b3198f00e
RIPEMD160(Wireshark-win32-2.6.17.msi)=916ebbfc94abd46a311f534035d62db63683878e
SHA1(Wireshark-win32-2.6.17.msi)=857f09180a299a9f18ff68ae24f0dbf758bdcd4e

WiresharkPortable_2.6.17.paf.exe: 37312512 bytes
SHA256(WiresharkPortable_2.6.17.paf.exe)=b8e2c12e43511f2febcdadf195ac5cb2c907f4b864b2824cec1884d40931006a
RIPEMD160(WiresharkPortable_2.6.17.paf.exe)=a0daced4dd3baad3f760cbcafcd52ddd803ff2f6
SHA1(WiresharkPortable_2.6.17.paf.exe)=8c735ab2e7128124f8138cf0860fc18b74977036

Wireshark 2.6.17 Intel 64.dmg: 108245045 bytes
SHA256(Wireshark 2.6.17 Intel 64.dmg)=b4d428a54b0acd1f7231f581ee5ae7c7556d160b417f4996a432933a66edc92c
RIPEMD160(Wireshark 2.6.17 Intel 64.dmg)=fd9c2d420dce19a0bbffbc4bb40483145f7c0f11
SHA1(Wireshark 2.6.17 Intel 64.dmg)=8ba48729abef0515e60582093bd7a75fdf8504a5

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

- -------------------------------------------------------------------------------

Wireshark 3.0.11 is now available

I'm proud to announce the release of Wireshark 3.0.11.


 What is Wireshark?

  Wireshark is the world's most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What's New

  The Windows installers now ship with Qt 5.12.8. They previously
  shipped with Qt 5.12.6.

  Bug Fixes

   The following vulnerabilities have been fixed:

     o wnpa-sec-2020-08[1] The NFS dissector could crash. Bug 16476[2].

   The following bugs have been fixed:

     o PVS-Studio analyser long list of issues. Bug 16335[3].

     o pcapng file dissector incorrectly computes nanoseconds from
       timestamps because it assumes the resolution is in nanoseconds.
       Bug 16440[4].

     o Read of uninitialized memory in detect_camins_file. Bug 16458[5].

     o Read of uninitialized memory in lanalyzer_read_trace_record. Bug
       16459[6].

     o Range parameter on numeric parameter in extcap plugin doesn't
       work. Bug 16510[7].

     o capinfos "Capture duration" output is truncated if there are more
       than 11 digits of seconds and fractions of a second. Bug
       16519[8].

     o MIME Files Format/pcapng: Simple Packet Block parsed incorrectly.
       Bug 16526[9].

     o Buildbot crash output: fuzz-2020-05-13-12195.pcap. Bug 16564[10].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   AoE, APRS, ASN.1 BER, FTP, GSM SMS, Infiniband, ISObus VT, MAC LTE,
   NFS, ONC RPC, OSC, pcapng, PDCP LTE, SDP, SIP, Snort, STUN, and UMTS
   FP

  New and Updated Capture File Support

   Camins, Catapult DCT 2000, Lanalyzer, and MPEG

  New and Updated Capture Interfaces support

   There is no new or updated capture file support in this release.

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[11] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About->Folders to
  find the default locations on your system.

 Getting Help

  The User's Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark's Q&A site[12] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark's mailing lists can be found on the web site[13].

  Bugs and feature requests can be reported on the bug tracker[14].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[15].

  Last updated 2020-05-19 18:02:07 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2020-08
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16335
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16440
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16458
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16459
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16510
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16519
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16526
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16564
  11. https://www.wireshark.org/download.html#thirdparty
  12. https://ask.wireshark.org/
  13. https://www.wireshark.org/lists/
  14. https://bugs.wireshark.org/
  15. https://www.wireshark.org/faq.html


Digests

wireshark-3.0.11.tar.xz: 30887388 bytes
SHA256(wireshark-3.0.11.tar.xz)=ee04bf24e33f2b2868f3a311422996ff55373264d406b3672522c14c888429b0
RIPEMD160(wireshark-3.0.11.tar.xz)=695d542c1f2735f63e88b754ba8ba87ec2c9bbd6
SHA1(wireshark-3.0.11.tar.xz)=af905567619462641e351b2bc7f22334400dd958

Wireshark-win32-3.0.11.exe: 54044416 bytes
SHA256(Wireshark-win32-3.0.11.exe)=c49459b98ae24ffb5b214b5979838bd8ed5458922d33dadfbad37d8c8654d929
RIPEMD160(Wireshark-win32-3.0.11.exe)=6347a256c2503c39d221ec95f70a85f01a4da4c9
SHA1(Wireshark-win32-3.0.11.exe)=81c84f726127ee2a1a231a9c00d2a3edda82f26e

Wireshark-win64-3.0.11.exe: 59262736 bytes
SHA256(Wireshark-win64-3.0.11.exe)=5ba8cf51a0894b447ce4e1f562313818035641c7694662d2622fb406e1971abb
RIPEMD160(Wireshark-win64-3.0.11.exe)=d7d7564003fa50039f2c830629374bdff93a7c18
SHA1(Wireshark-win64-3.0.11.exe)=61b7e3a007396b2e6b1bd655ba8bc42c6b9f3efc

Wireshark-win32-3.0.11.msi: 42020864 bytes
SHA256(Wireshark-win32-3.0.11.msi)=8ace795b35dee007061e97a05c48bc131915860a4f24afa35e5cac808bdcdc79
RIPEMD160(Wireshark-win32-3.0.11.msi)=e75e28db06b3648be5c6585c2c83c8d98290ec78
SHA1(Wireshark-win32-3.0.11.msi)=dd476a033f7d7565c08edc19cab458f620ad38fa

Wireshark-win64-3.0.11.msi: 47230976 bytes
SHA256(Wireshark-win64-3.0.11.msi)=4cd8ec47374f498cefcc14e1a5930aff59418743f234498bb5c09cfadf3ddbb1
RIPEMD160(Wireshark-win64-3.0.11.msi)=7fdb8bbeb931cfacaca916dba76e1aed257a8bb1
SHA1(Wireshark-win64-3.0.11.msi)=c78431b56c96677d7e28a233b9dd3488f621a21b

WiresharkPortable_3.0.11.paf.exe: 35810248 bytes
SHA256(WiresharkPortable_3.0.11.paf.exe)=83c0a70729cf24c34ba08277c4f6b846bcda77e75c8a639cd5030daa0c767b28
RIPEMD160(WiresharkPortable_3.0.11.paf.exe)=97de551c9100c4ecad284e933b7297dd53c1ab83
SHA1(WiresharkPortable_3.0.11.paf.exe)=f418f29f714e639146df8f155c7bb4cbd54599de

Wireshark 3.0.11 Intel 64.dmg: 93102152 bytes
SHA256(Wireshark 3.0.11 Intel 64.dmg)=c382859ef7fc465e525d890b02ceff9d42fee0fd835d9d7caa80e3fdec9c4b1a
RIPEMD160(Wireshark 3.0.11 Intel 64.dmg)=06de7690f1f0a8754745a0e4e6829e85b2416662
SHA1(Wireshark 3.0.11 Intel 64.dmg)=00d869f9b406ee8c628ecdcbe1e09d52787fe18b

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

- -------------------------------------------------------------------------------

Wireshark 3.2.4 is now available

I'm proud to announce the release of Wireshark 3.2.4.


 What is Wireshark?

  Wireshark is the world's most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What's New

  The Windows installers now ship with Qt 5.12.8. They previously
  shipped with Qt 5.12.6.

  The Windows installers now ship with Npcap 0.9991 They previously
  shipped with Npcap 0.9989

  Bug Fixes

   The following vulnerabilities have been fixed:

     o wnpa-sec-2020-08[1] The NFS dissector could crash. Bug 16476[2].

   The following bugs have been fixed:

     o SDP dissector does not parse sprop-parameter-sets field. Bug
       16322[3].

     o PVS-Studio analyser long list of issues. Bug 16335[4].

     o Can't have duplicate personal and global profile names. Bug
       16423[5].

     o pcapng file dissector incorrectly computes nanoseconds from
       timestamps because it assumes the resolution is in nanoseconds.
       Bug 16440[6].

     o Read of uninitialized memory in detect_camins_file. Bug 16458[7].

     o Read of uninitialized memory in lanalyzer_read_trace_record. Bug
       16459[8].

     o capture -> options -> select interface -> (choose) -> SEGV. Bug
       16489[9].

     o SOMEIP: SOME/IP dissector ignores the length field configuration
       of structs. Bug 16490[10].

     o Packet List Pane doesn't consume the entire pane. Bug 16491[11].

     o Range parameter on numeric parameter in extcap plugin doesn't
       work. Bug 16510[12].

     o Export Packet Dissections not working on Windows (Wireshark
       3.2.x). Bug 16516[13].

     o capinfos "Capture duration" output is truncated if there are more
       than 11 digits of seconds and fractions of a second. Bug
       16519[14].

     o MIME Files Format/pcapng: Simple Packet Block parsed incorrectly.
       Bug 16526[15].

     o SOMEIP: SOME/IP-SD unique id is not unique for eventgroup types
       (BUG). Bug 16549[16].

     o Buildbot crash output: fuzz-2020-05-13-12195.pcap. Bug 16564[17].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   AoE, APRS, ASN.1 BER, DIS, DTLS, FTP, GSM SMS, H.264, IMAP,
   Infiniband, ISObus VT, Kafka, LSD, MAC LTE, NAS 5GS, NFS, ONC RPC,
   OSC, pcapng, PDCP LTE, RADIUS, RLC LTE, RTSP, SDP, SIP, Snort,
   SOMEIP, STUN, TLS, and UMTS FP

  New and Updated Capture File Support

   Camins, Catapult DCT 2000, Lanalyzer, and MPEG

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[18] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About->Folders to
  find the default locations on your system.

 Getting Help

  The User's Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark's Q&A site[19] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark's mailing lists can be found on the web site[20].

  Bugs and feature requests can be reported on the bug tracker[21].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[22].

  Last updated 2020-05-19 17:45:44 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2020-08
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16322
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16335
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16423
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16440
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16458
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16459
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16489
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16490
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16491
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16510
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16516
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16519
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16526
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16549
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16564
  18. https://www.wireshark.org/download.html#thirdparty
  19. https://ask.wireshark.org/
  20. https://www.wireshark.org/lists/
  21. https://bugs.wireshark.org/
  22. https://www.wireshark.org/faq.html


Digests

wireshark-3.2.4.tar.xz: 31580440 bytes
SHA256(wireshark-3.2.4.tar.xz)=d17d461e849e2d0b033431c45f71d8ee8ec3c8faa232a6ad63069a47927db8aa
RIPEMD160(wireshark-3.2.4.tar.xz)=5dccf5ba44dd8f6c275b74ab07137ce80f4ab76d
SHA1(wireshark-3.2.4.tar.xz)=bb4157b57c1bcdbac948a1282dafad027d57be9b

Wireshark-win32-3.2.4.exe: 54867824 bytes
SHA256(Wireshark-win32-3.2.4.exe)=c17e4a812031d5dfd4ef0a4b4dae1b60bb45eb7ce8c9e8b1b5eff4db5bcf4b72
RIPEMD160(Wireshark-win32-3.2.4.exe)=3ac743c96a4b1e9e006501e45b1a8f398d54d511
SHA1(Wireshark-win32-3.2.4.exe)=ea4cc781339618eb16db4fdc96c413f119229ef3

Wireshark-win64-3.2.4.exe: 60037848 bytes
SHA256(Wireshark-win64-3.2.4.exe)=db2565ee6410b7c57f54aaac86954e4f6a98e2ea31ffbea83e60b981fff57301
RIPEMD160(Wireshark-win64-3.2.4.exe)=e058bfdb62c1b0392d39c80d24e7f001587ed907
SHA1(Wireshark-win64-3.2.4.exe)=32c0cea3623db22eb7f0dbf24ac4902a4e873f3d

Wireshark-win32-3.2.4.msi: 43028480 bytes
SHA256(Wireshark-win32-3.2.4.msi)=a614bdb63e9dfa1150cdcb471790ebe32f1c8a269079cbccab6ece4ad7700575
RIPEMD160(Wireshark-win32-3.2.4.msi)=7431e01c63b522ad59f1adb58fa0da7e5b12362b
SHA1(Wireshark-win32-3.2.4.msi)=22ca61d51e9d66e198769225fbbc0bfc2f3a0f76

Wireshark-win64-3.2.4.msi: 48283648 bytes
SHA256(Wireshark-win64-3.2.4.msi)=eb13bc841c98c398a7f26705f3621ac4ffe90fc158f4ea48db3ba56968a0d41b
RIPEMD160(Wireshark-win64-3.2.4.msi)=33e2f498e1919a11b1c20cb125af30c304534cc8
SHA1(Wireshark-win64-3.2.4.msi)=4e2aeab60879518b5d9a81d8449874db23ad4dc6

WiresharkPortable_3.2.4.paf.exe: 36581616 bytes
SHA256(WiresharkPortable_3.2.4.paf.exe)=2c8ea4e6776a334d43909c53d7c656db10ad425beec5fe927b8d1fb0467309da
RIPEMD160(WiresharkPortable_3.2.4.paf.exe)=759413437b7b91efe28eab3c6120530421ada774
SHA1(WiresharkPortable_3.2.4.paf.exe)=6c0f29f5554b0ee7160b21f7a6c6a5069161e266

Wireshark 3.2.4 Intel 64.dmg: 97572886 bytes
SHA256(Wireshark 3.2.4 Intel 64.dmg)=735d43bdbde1caeb9bfff89acc62acfeb05ffda36e6d0d243bc08333e60fdac6
RIPEMD160(Wireshark 3.2.4 Intel 64.dmg)=672b26161f45f015fff6d16d96570b85f59c0bcb
SHA1(Wireshark 3.2.4 Intel 64.dmg)=5a550cae3e5cc02441f39df2fdb84edb525d5b87

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=SHhE
-----END PGP SIGNATURE-----