Wireshark 1.4.7 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.

The following vulnerabilities have been fixed:
Large/infinite loop in the DICOM dissector. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.
Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted Diameter dictionary file could crash Wireshark. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.
Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted snoop file could crash Wireshark. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.
David Maciejak of Fortinet’s FortiGuard Labs discovered that malformed compressed capture data could crash Wireshark. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.
Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted Visual Networks file could crash Wireshark. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.
The following bugs have been fixed:
- AIM dissector has some endian issues.
 - Telephony→MTP3→MSUS doesn’t display window.
 - Support for MS NetMon 3.x traces containing raw IPv6 (“Type 7”) packets.
 - Service Indicator in M3UA protocol data.
 - IEC60870-5-104 protocol, incorrect decoding of timestamp type CP56Time2a.
 - DNP3 dissector incorrect constants AL_OBJ_FCTR_16NF _FDCTR_32NF _FDCTR_16NF.
 - 3GPP QoS: Traffic class is not decoded properly.
 - Wireshark crashes when creating ProtoField.framenum in Lua.
 - Fix a wrong mask to extract FMID from DECT packets dissector.
 - Incorrect DHCPv6 remote identifier option parsing.