Connect with us

Business

Wireshark 4.0.7 Released – What’s New!

Published

on

Wireshark, an industry-leading network packet analyzer, has released version 4.0.7, which includes defect fixes, protocol updates, and a few enhancements. It continues to be an extensively utilized and popular network protocol analysis tool.

Wireshark, a packet analyzer, is mainly utilized by network administrators and security analysts to analyze network packets and resolve issues, making it a valuable tool for organizations across various industries.

Network administrators and security experts use the packet analyzer Wireshark to investigate network traffic and identify problems, making it an invaluable resource for businesses of all stripes.

Wireshark 4.0.7 – Vulnerabilities Addressed:

We have listed the fixed security issues below:-

Bugs Patched:

  • Crash when (re)loading a capture file after renaming a dfilter macro. Issue 13753.
  • Moving a column deselects selected packet and moves to beginning of packet list. Issue 16251.
  • If you set the default interface in the preferences, it doesn’t work with TShark. Issue 16593.
  • Severe performance issues in Follow → Save As raw workflow. Issue 17313.
  • TShark doesn’t support the tab character as an aggregator character in \”-T fields\” Issue 18002.
  • On Windows clicking on a link in the ‘Software Update’ window launches, now unsupported, MS Internet Explorer. Issue 18488.
  • Wireshark 4.x.x on Win10-x64 crashes after saving a file with a name already in use. Issue 18679.
  • NAS-5GS Operator-defined Access Category: Multiple Criteria values not displayed in dissected packet display. Issue 18941.
  • Server Hello Packet Invisible – during 802.1x Authentication- from Wireshark App Version 4.0.3 (v4.0.3-0-gc552f74cdc23) & above. Issue 19071.
  • TShark reassembled data is incomplete/truncated. Issue 19107.
  • CQL protocol parsing issues with Result frames from open source Cassandra. Issue 19119.
  • TLS 1.3 second Key Update doesn’t work. Issue 19120.
  • HTTP2 dissector reports an assertion error on large data frames. Issue 19121.
  • epan: Single letter hostnames aren’t displayed correctly. Issue 19137.
  • BLF: CAN-FD-Message format is missing a field. Issue 19146.
  • BLF: last parameter of LIN-Message is not mandatory (BUGFIX) Issue 19147.
  • PPP IPv6CP: Incorrect payload length warning. Issue 19149.
  • INSTALL file needs to be updated for Debian. Issue 19167.
  • Some RTP streams make Wireshark crash when trying to play stream. Issue 19170.
  • Wrong ordering in OpenFlow 1.0 Datapath unique ID. Issue 19172.
  • Incorrect mask in RTCP slice picture ID. Issue 19182.
  • Dissection error in AMQP 1.0. Issue 19191.

Updated Protocol Support

9P, AMQP, BGP, CQL, DHCPFO, EAP, GlusterFS, GSM MAP, HTTP2, iSCSI, Kafka, Kerberos, NAN, NAS-5GS, OCP.1, OpenFlow 1.0, PDCP-NR, PEAP, PPPoE, RSL, RTCP, rtnetlink, and XMPP.

For more information on the release, visit the Wireshark 4.0.7 release notes page.

Source: https://cybersecuritynews.com/wireshark-4-0-7/

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2023 Cyber Reports Cyber Security News All Rights Reserved Website by Top Search SEO