Monday, December 4, 2023

Wireshark 3.2.7 Released With Fix for Security Vulnerabilities & New Features

Wireshark 3.2.7 was released with a fix for security vulnerabilities and an updated version of Npcap & Qt. Wireshark is known as the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.

It is used by network administrators to troubleshoot network and by the security, analyst to examine the packets. It is a widely used tool in organizations.

Wireshark 3.2.7

With the new, the Windows installers now ship with Npcap 0.9997 & Qt 5.12.9.

Npcap – A Nmap Project’s packet sniffing (and sending) library for Windows.
Qt – widget toolkit for creating graphical user interfaces.

Security Vulnerabilities Fixed

CVE-2020-25863 – MIME Multipart dissector crash
CVE-2020-25862 – TCP dissector crash
CVE-2020-25866 – BLIP dissector crash

By exploiting the vulnerabilities attackers can crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Other Bugs fixed;

  • HTTP dissector fails to display correct UTF-16 XML Bug 9069.
  • TFTP dissector does not track conversations correctly. Source file and Destination File redundant or disagree. Bug 10305.
  • Dissector skips DICOM command Bug 13110.
  • Editcap time adjustment doesn’t work when both infile and outfile are ERF Bug 16578.
  • dissect_tds7_colmetadata_token() has wrong return value if count is 0 Bug 16682.
  • “total block length …​ is too small” for Systemd Journal Export Block Bug 16734.
  • MNC 11 is showing Mobile Network Code (MNC): NTT DoCoMo Tokai Inc. (11) But its belonging to Rakuten Network Bug 16755.
  • DICOM object extraction: discrepancy between tshark and wireshark Bug 16771.
  • S1-U data forwarding info and S103 PDN data forwarding info IE’s showing improper value Bug 16777.
  • Wireshark crashes while opening a capture Bug 16780.
  • Changing preferences via Decode As does not call callback Bug 16787.
  • Decoding of PFCP IE ‘Remote GTP-U Peer’ is incorrect Bug 16805.
  • Ng-enb not decoded correctly for Target Identification IE for GTPV2 Bug 16822.
  • The client timestamp is parsed error for Google QUIC (version Q039) Bug 16839.
  • NAS-5G : PDU session reactivation result Bug 16842.
  • Wireshark fails to detect libssh >= 0.9.5 Bug 16845.

Protocols supported

Aeron, AFP, BLIP, BSSMAP, C12.22, DICOM, E.212, GQUIC, GSM A RR, GTPv2, GVSP, IPX SAP, MIME Multipart, MMS, NAS-5GS, NCP, NDS, PFCP, PROFINET, Q.708, Q.933, RTCP, S1AP, TACACS+, TCP, TDS, TDS7, X2AP, and XML

The new version can be downloaded from here.

Training Course: Master in Wireshark Network Analysis – Hands-on course provides a complete network analysis Training using Wireshark.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles