Saturday, December 21, 2024
HomeNetwork SecurityWireshark 3.0.5 Released with the fix for Several Vulnerabilities

Wireshark 3.0.5 Released with the fix for Several Vulnerabilities

Published on

SIEM as a Service

Wireshark 3.0.5 has been released with the new Qt version and fix for other vulnerabilities. The Qt is the library used in Wireshark to build the UI.

The Wireshark is the famous protocol analyzer tool used for protocol analysis, troubleshooting, protocol development, and education.

It is used by network administrators to troubleshoot network and by the security analyst to examine the packets. It is a widely used tool in organizations.

- Advertisement - SIEM as a Service

Wireshark 3.0.5

With the release the windows installers ships with Qt 5.12.5, previously it was Qt 5.12.4. Before upgrading to the new version, Wireshark team recommends to manually uninstall Npcap 0.994 or 0.995 if it is installed.

If the Npcap was not installed, it may results in a possible crash while upgrading. More details about Npcap bugs can be found here and here.

Wireshark also provided steps to manually uninstall Npcap

  1. Open a command or PowerShell prompt as Administrator and run sc.exe config npcap start=disabled.
  2. Run sc.exe config npf start=disabled. This will fail if WinPcap compatibility mode isn’t enabled, but is otherwise harmless.
  3. Reboot (optional).
  4. Open “Programs and Features” in the Control Panel or “Apps & features” in Settings and uninstall Npcap.
  5. Open “Device Manager” (devmgmt.msc) in the Control Panel and expand the “Network adapters” section. Uninstall each “Npcap Loopback Adapter” that you find.

Other Bugs Fixed

  • Qt interface crashes on a profile with packet list only. Bug 16048.
  • Wireshark 3.0.4 does not start on macOS 10.13 after an upgrade from 3.0.3. Bug 16050.
  • NET-SNMP EngineID Length handling Warning. Bug 16051.
  • Upgrade from Wireshark 3.0.2/3.0.3 to 3.0.4/later is confusing and may not complete properly. Bug 16052.
  • Crash SIGSEGV when decrypting IEEE 802.11 EAP re-authentications. Bug 16058.

The new version can be downloaded from here.

Training Course: Master in Wireshark Network Analysis – Hands-on course provides a complete network analysis Training using Wireshark.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Wireshark 3.0.4 Released – Several Vulnerabilities are Fixed & Updated Versions of Npcap

Wireshark 3.0.0 Released With Support for Npcap Packet Capturing Library

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker...

Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution

A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could...

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit...

Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access

Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Hijacked Misconfigured Servers For Live Streaming Sports

Recent threat hunting activities focused on analyzing outbound network traffic and binaries within containerized...

Crypto Network Security: Essential Tips To Protect Your Digital Assets In 2023 

Exploring the world of cryptocurrencies has been a thrilling journey for me. The allure...

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller,...