Sunday, November 24, 2024
HomeCVE/vulnerabilityWireshark 3.0.7 Released - Fixes for Security Vulnerabilities & Update for BGP,...

Wireshark 3.0.7 Released – Fixes for Security Vulnerabilities & Update for BGP, IEEE 802.11, TLS Protocols

Published on

Wireshark 3.0.7 released with a number of security updates and fixed several other bugs that reside in the Wireshark components.

Wireshark also updated Protocol Support for various protocols such as BGP, HomePlug AV, IEEE 802.11, and TLS.

Wireshark is known as the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.

- Advertisement - SIEM as a Service

It is used by network administrators to troubleshoot network and by the security, analyst to examine the packets. It is a widely used tool in organizations.

Wireshark 3.0.7 fixed the vulnerability {CVE-2019-19553)) that resides in the CMS dissector that affected the Wireshark version 3.0.0 to 3.0.6, 2.6.0 to 2.6.12.

“It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.”

Other Fixed Bugs in Wireshark 3.0.7

  • ws_pipe_wait_for_pipe() can wait on closed handles. Bug 15696.
  • Support for 11ax in PEEKREMOTE. Bug 15740.
  • The temporary file …​ could not be opened: Invalid argument. Bug 15751.
  • Reassembling of the two TLS records is not working correctly. Bug 16109.
  • Display Filter Area: Dropdown Missing pkt_comment and tcp.options.sack_perm (likely others). Bug 16130.
  • Display Filter autocompletion should be disabled. Bug 16132.
  • BGP Linkstate IP Reachability information is incorrect. Bug 16144.
  • NGAP: ExpectedUEActivityBehaviour decode error. Bug 16145.
  • HomePlug AV dissector: MMTYPE and FMI fields are dissected incorrectly. Bug 16158.
  • JPEG files cannot be saved on Windows with french language. Bug 16165.
  • X11 –display interpreted as –display-filter which maps to -Y option. Bug 16167.
  • “Create new file automatically after” not working with extcap. Bug 16178.
  • Encrypted TLS alerts sometimes listed as decrypted. Bug 16180.
  • The “Remove Wireshark from the system path” package has “Add Wireshark to the system PATH” as its title. Bug 16200.
  • tshark -T ek -x causes get_field_data: code should not be reached. Bug 16218.
  • Crash on Go → Next/Previous Packet in Conversation when no packet is selected. Bug 16228.

The new version of Wireshark can be downloaded from here.

Training Course: Master in Wireshark Network Analysis – Hands-on course provides a complete network analysis Training using Wireshark.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Helldown Ransomware Attacking VMware ESXi And Linux Servers

Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August...

Hackers Hijacked Misconfigured Servers For Live Streaming Sports

Recent threat hunting activities focused on analyzing outbound network traffic and binaries within containerized...

Volt Typhoon Attacking U.S. Critical Infra To Maintain Persistent Access

Volt Typhoon, a Chinese state-sponsored threat actor, targets critical infrastructure sectors like communications, energy,...