Monday, November 4, 2024
HomeNetwork SecurityWireshark 3.2.7 Released With Fix for Security Vulnerabilities & New Features

Wireshark 3.2.7 Released With Fix for Security Vulnerabilities & New Features

Published on

Malware protection

Wireshark 3.2.7 was released with a fix for security vulnerabilities and an updated version of Npcap & Qt. Wireshark is known as the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.

It is used by network administrators to troubleshoot network and by the security, analyst to examine the packets. It is a widely used tool in organizations.

Wireshark 3.2.7

With the new, the Windows installers now ship with Npcap 0.9997 & Qt 5.12.9.

- Advertisement - SIEM as a Service

Npcap – A Nmap Project’s packet sniffing (and sending) library for Windows.
Qt – widget toolkit for creating graphical user interfaces.

Security Vulnerabilities Fixed

CVE-2020-25863 – MIME Multipart dissector crash
CVE-2020-25862 – TCP dissector crash
CVE-2020-25866 – BLIP dissector crash

By exploiting the vulnerabilities attackers can crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Other Bugs fixed;

  • HTTP dissector fails to display correct UTF-16 XML Bug 9069.
  • TFTP dissector does not track conversations correctly. Source file and Destination File redundant or disagree. Bug 10305.
  • Dissector skips DICOM command Bug 13110.
  • Editcap time adjustment doesn’t work when both infile and outfile are ERF Bug 16578.
  • dissect_tds7_colmetadata_token() has wrong return value if count is 0 Bug 16682.
  • “total block length …​ is too small” for Systemd Journal Export Block Bug 16734.
  • MNC 11 is showing Mobile Network Code (MNC): NTT DoCoMo Tokai Inc. (11) But its belonging to Rakuten Network Bug 16755.
  • DICOM object extraction: discrepancy between tshark and wireshark Bug 16771.
  • S1-U data forwarding info and S103 PDN data forwarding info IE’s showing improper value Bug 16777.
  • Wireshark crashes while opening a capture Bug 16780.
  • Changing preferences via Decode As does not call callback Bug 16787.
  • Decoding of PFCP IE ‘Remote GTP-U Peer’ is incorrect Bug 16805.
  • Ng-enb not decoded correctly for Target Identification IE for GTPV2 Bug 16822.
  • The client timestamp is parsed error for Google QUIC (version Q039) Bug 16839.
  • NAS-5G : PDU session reactivation result Bug 16842.
  • Wireshark fails to detect libssh >= 0.9.5 Bug 16845.

Protocols supported

Aeron, AFP, BLIP, BSSMAP, C12.22, DICOM, E.212, GQUIC, GSM A RR, GTPv2, GVSP, IPX SAP, MIME Multipart, MMS, NAS-5GS, NCP, NDS, PFCP, PROFINET, Q.708, Q.933, RTCP, S1AP, TACACS+, TCP, TDS, TDS7, X2AP, and XML

The new version can be downloaded from here.

Training Course: Master in Wireshark Network Analysis – Hands-on course provides a complete network analysis Training using Wireshark.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller,...

Chinese Hackers Using Open Source Tools To Launch Cyber Attacks

Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a...

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber...