Wireshark 3.2.7

Wireshark 3.2.7 was released with a fix for security vulnerabilities and an updated version of Npcap & Qt. Wireshark is known as the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.

It is used by network administrators to troubleshoot network and by the security, analyst to examine the packets. It is a widely used tool in organizations.

Wireshark 3.2.7

With the new, the Windows installers now ship with Npcap 0.9997 & Qt 5.12.9.

Npcap – A Nmap Project’s packet sniffing (and sending) library for Windows.
Qt – widget toolkit for creating graphical user interfaces.

Security Vulnerabilities Fixed

CVE-2020-25863 – MIME Multipart dissector crash
CVE-2020-25862 – TCP dissector crash
CVE-2020-25866 – BLIP dissector crash

By exploiting the vulnerabilities attackers can crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Other Bugs fixed;

  • HTTP dissector fails to display correct UTF-16 XML Bug 9069.
  • TFTP dissector does not track conversations correctly. Source file and Destination File redundant or disagree. Bug 10305.
  • Dissector skips DICOM command Bug 13110.
  • Editcap time adjustment doesn’t work when both infile and outfile are ERF Bug 16578.
  • dissect_tds7_colmetadata_token() has wrong return value if count is 0 Bug 16682.
  • “total block length …​ is too small” for Systemd Journal Export Block Bug 16734.
  • MNC 11 is showing Mobile Network Code (MNC): NTT DoCoMo Tokai Inc. (11) But its belonging to Rakuten Network Bug 16755.
  • DICOM object extraction: discrepancy between tshark and wireshark Bug 16771.
  • S1-U data forwarding info and S103 PDN data forwarding info IE’s showing improper value Bug 16777.
  • Wireshark crashes while opening a capture Bug 16780.
  • Changing preferences via Decode As does not call callback Bug 16787.
  • Decoding of PFCP IE ‘Remote GTP-U Peer’ is incorrect Bug 16805.
  • Ng-enb not decoded correctly for Target Identification IE for GTPV2 Bug 16822.
  • The client timestamp is parsed error for Google QUIC (version Q039) Bug 16839.
  • NAS-5G : PDU session reactivation result Bug 16842.
  • Wireshark fails to detect libssh >= 0.9.5 Bug 16845.

Protocols supported

Aeron, AFP, BLIP, BSSMAP, C12.22, DICOM, E.212, GQUIC, GSM A RR, GTPv2, GVSP, IPX SAP, MIME Multipart, MMS, NAS-5GS, NCP, NDS, PFCP, PROFINET, Q.708, Q.933, RTCP, S1AP, TACACS+, TCP, TDS, TDS7, X2AP, and XML

The new version can be downloaded from here.

Training Course: Master in Wireshark Network Analysis – Hands-on course provides a complete network analysis Training using Wireshark.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Leave a Reply