Thursday, February 27, 2025
HomeNetwork SecurityWireshark 3.4.9 Released – What’s New!!

Wireshark 3.4.9 Released – What’s New!!

Published on

SIEM as a Service

Follow Us on Google News

Recently, Wireshark has released a new version of its free and open-source packet analyzer, Wireshark 3.4.9 with all new features and protocols. 

Wireshark is one of the world’s most widespread network protocol analyzers, and the analyzers are used for different purposes, like:- 

  • Troubleshooting
  • Analysis
  • Development
  • Education 

Wireshark runs on Windows, Linux, and macOS, with separate downloads for 32-bit and 64-bit versions of the operating systems.

What’s New in Wireshark 3.4.9?

Here are the new things added:-

  • Extensive examination of hundreds of protocols, with more being annexed all the time
  • Live capture and offline review
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Obtained network data that can be browsed through a GUI, or via the TTY-mode TShark utility
  • It has the most compelling display filters in the industry
  • Rich VoIP analysis
  • Read/write various capture file formats
  • Capture files packed with gzip can be decompressed on the fly
  • Live data can be viewed from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be implemented to the packet list for expeditious, automatic analysis
  • Output can be exported to XML, PostScript, CSV, or plain text

Bug Fixes

Here are the fixes made in this new version:-

  • TShark PDML output embeds “proto” elements within other “proto” elements Issue 10588.
  • Filter expressions correlating against single-octet hex strings where the hex digit string equals a protocol name don’t work Issue 12810.
  • AMQP 0.9: dissector fails to handle Content-Body frame split across TCP packets Issue 14217.
  • IEEE 802.15.4: Missing check on “PAN ID Present” bit of the Multipurpose Frame Control field Issue 17496.
  • Wireshark ignored some characters in the filename when transporting SMB objects. Issue 17530.
  • tshark -z credentials: assertion failed: (allocator→in_scope) Issue 17576.
  • IS-IS Extended IP Reachability Prefix-SID not decoded properly Issue 17610.
  • Error when reloading Lua plugins with a capture file loaded via a custom Lua file handler Issue 17615.
  • Absolute time UTC field filters are constructed incorrectly, don’t match the packet Issue 17617.
  • GUI freezes when clicking on a large (non-capture) file in File chooser Issue 17620.
  • Crash after selecting a different profile while capturing Issue 17622.
  • BT-DHT reports malformed packets that are actually uTP on the same connection Issue 17626.

Updated Protocol Support

Here is the list of all updated protocol support:-

  • AMQP
  • Aruba IAP
  • BGP
  • BT-DHT
  • CoAP
  • DCERPC SPOOLSS
  • Diameter
  • EPL
  • GSM A-bis OML
  • GSM A-I/F COMMON
  • GSM SIM
  • IEEE 1905.1a
  • IEEE 802.15.4
  • IMAP
  • InfiniBand
  • ISIS LSP
  • ISObus VT
  • JPEG
  • MP2T
  • NORDIC_BLE
  • QUIC
  • RTCP
  • SDP
  • SMB
  • TWAMP-Control
  • USB HID
  • VSS Monitoring

New and Updated Capture File Support

  • CAM Inspector
  • Ixia IxVeriWave
  • pcapng
  • USBDump

Vendor-supplied Packages

The vendors of Linux and Unix mostly provide their own Wireshark packages, and therefore one can usually install or simply update Wireshark utilizing the package management system specific to that platform. 

Moreover, while downloading it users will get a list of third-party packages on the download page on the Wireshark website

But, this new version of Wireshark has many features and it also fixed many bugs that we have mentioned above, so, users must update their Wireshark for better performance as soon as possible.

The new version can be downloaded from here.

Training Course: Complete Wireshark Network Analysis Bundle – Hands-on course provides complete network analysis Training using Wireshark.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has...

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity...

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...