The world`s foremost network protocol analyzer for Windows

Wireshark (32-bit)

Wireshark 1.12.1 (32-bit)

  -  27.11 MB  -  Open Source

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Wireshark 1.12.1 (32-bit).


For those interested in downloading the most recent release of Wireshark (32-bit) or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Wireshark 1.12.1 (32-bit) Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Wireshark 1.12.1 (32-bit) Screenshot 1
  • Wireshark 1.12.1 (32-bit) Screenshot 2
  • Wireshark 1.12.1 (32-bit) Screenshot 3
  • Wireshark 1.12.1 (32-bit) Screenshot 4
  • Wireshark 1.12.1 (32-bit) Screenshot 5

What's new in this version:

BUG FIXES:
The following vulnerabilities have been fixed:
- wnpa-sec-2014-13: MEGACO dissector infinite loop. (Bug 10333) CVE-2014-6423
- wnpa-sec-2014-14: Netflow dissector crash. (Bug 10370) CVE-2014-6424
- wnpa-sec-2014-15: CUPS dissector crash. (Bug 10353) CVE-2014-6425
- wnpa-sec-2014-16: HIP dissector infinite loop. CVE-2014-6426
- wnpa-sec-2014-17: RTSP dissector crash. (Bug 10381) CVE-2014-6427
- wnpa-sec-2014-18: SES dissector crash. (Bug 10454) CVE-2014-6428
- wnpa-sec-2014-19: Sniffer file parser crash. (Bug 10461) CVE-2014-6429 CVE-2014-6430 CVE-2014-6431 CVE-2014-6432 The following bugs have been fixed:
- Wireshark can crash during remote capture (rpcap) configuration. (Bug 3554, Bug 6922, ws-buglink:7021)
- 802.11 capture does not decrypt/decode DHCP response. (Bug 8734)
- Extra quotes around date fields (FT_ABSOLUTE_TIME) when using -E quote=d or s. (Bug 10213)
- No progress line in "VOIP RTP Player". (Bug 10307)
- MIPv6 Service Selection Identifier parse error. (Bug 10323)
- Probably wrong length check in proto_item_set_end. (Bug 10329)
- 802.11 BA sequence number decode is broken. (Bug 10334)
- wmem_alloc_array() "succeeds" (and clobbers memory) when requested to allocate 0xaaaaaaaa items of size 12. (Bug 10343)
- Different dissection results for same file. (Bug 10348)
- Mergecap wildcard breaks in version 1.12.0. (Bug 10354)
- Diameter TCP reassemble. (Bug 10362)
- TRILL NLPID 0xc0 unknown to Wireshark. (Bug 10382)
- BTLE advertising header flags (RxAdd/TxAdd) dissected incorrectly. (Bug 10384)
- Ethernet OAM (CFM) frames including TLV’s are wrongly decoded as malformed. (Bug 10385)
- BGP4: Wireshark skipped some potion of AS_PATH. (Bug 10399)
- MAC address name resolution is broken. (Bug 10344)
- Wrong decoding of RPKI RTR End of Data PDU. (Bug 10411)
- SSL/TLS dissector incorrectly interprets length for status_request_v2 hello extension. (Bug 10416)
- Misparsed NTP control assignments with empty values. (Bug 10417)
- 6LoWPAN multicast address decompression problems. (Bug 10426)
- Netflow v9 flowset not decoded if options template has zero-length scope section. (Bug 10432)
- GUI Hangs when Selecting Path to GeoIP Files. (Bug 10434)
- AX.25 dissector prints unprintable characters. (Bug 10439)
- 6LoWPAN context handling not working. (Bug 10443)
- SIP: When export to a CSV, Info is changed to differ. (Bug 10453)
- Typo in packet-netflow.c. (Bug 10458)
- Incorrect MPEG-TS decoding (OPCR field). (Bug 10446) UPDATED PROTOCOL SUPPORT:
- 6LoWPAN, A21, ACR122, Art-Net, AX.25, BGP, BTLE, CAPWAP, DIAMETER, DICOM, DVB-CI, Ethernet OAM, HIP, HiSLIP, HTTP2, IEEE 802.11, MAUSB, MEGACO, MIPv6, MP2T, Netflow, NTP, openSAFETY, OSI, RDM, RPKI RTR, RTSP, SES, SIP, TLS, and Token Ring MAC NEW AND UPDATED CAPTURE FILE SUPPORT:
- DOS Sniffer and NetScaler