Wireshark 4.0.4 Released – What’s New!!

The latest release of Wireshark, version 4.0.4, has been launched by the Wireshark Team. This new version offers a host of improvements and updates that enhance protocol support, including several bug fixes.

It can be used for a wide range of purposes, including the analysis, development, education, and troubleshooting of networks.

This tool has become an essential part of many organizations’ daily operations, as it provides valuable assistance in managing their business activities. Its extensive functionality and versatility have made it a popular choice for a wide range of businesses, regardless of their size or industry.

Compatibility

If you are looking for a packet analyzer that is compatible with various operating systems, then Wireshark is the tool for you. It supports a wide range of operating systems, making it accessible to users with different system preferences.

Here below we have mentioned the supported platforms:-

  • Windows
  • Linux
  • macOS
  • BSD

What’s New in Wireshark 4.0.4

The following is a list of the major changes that have been made in Wireshark 4.0.4 since the previous version. The Wireshark Team has recently made changes to their packaging policy for Windows users. 

As of version 4.0 and later, official 32-bit Windows packages for Wireshark are no longer available. Instead, users are advised to use the latest 3.6 release if they need to use Wireshark on that platform.

Updated Protocol Support

Here below we have mentioned all the updated protocol support:-

  • ASTERIX
  • BGP
  • DHCP
  • ERF
  • F5 Ethernet trailer
  • GMR-1 RR
  • Gryphon
  • GSM SMS
  • H.261
  • H.450
  • ISO 10681
  • ISO 15765
  • MIPv6
  • NAS-5gs
  • NR RRC
  • NS Trace
  • OptoMMP
  • PDCP-LTE
  • PDCP-NR
  • QSIG
  • ROHC
  • RSVP
  • RTCP
  • SCTP
  • SIP
  • TCP
  • TECMP
  • TWAMP
  • UDS
  • UMTS RLC

Bug Fixes in Wireshark 4.0.4

The latest version of this software includes a number of new fixes that address vulnerabilities and bugs discovered in earlier versions. 

These fixes were developed in response to user feedback and ongoing testing to ensure that the software is as reliable and secure as possible. 

By addressing these issues, the new version of the software delivers enhanced stability and improved security, providing a better user experience overall.

Here below we have mentioned all the bug fixes:-

  • wnpa-sec-2023-08 ISO 15765 and ISO 10681 dissector crash.
  • UTF-8 characters end up escaped in PSML output.
  • Export filtered displayed packets won’t save IP fragments of SCTP fragments needed to reassemble a displayed frame.
  • DICOM dissection in reassembled PDV goes wrong.
  • “Export Objects – IMF” produces incorrect file, TCP reassembly fails with retransmissions that have additional data.
  • The intelligent scroll bar or minimap is not predictable on locating and scrolling.
  • If you mark (or unmark) the currently-selected frame, the packet details still say it’s not marked (or it is marked).
  • An out-of-order packet incorrectly detected as retransmission breaks desegmentation of TCP stream.
  • Sorting Packet Loss Column is not sorting correct.
  • Some HTTPS packets cannot be decrypted.
  • SIP TCP decoding regression from Wireshark 1.99.0 to 3.6.8.
  • Frame comments not preserved when using filter to write new pcap from tshark.
  • ChmodBPF not working on macOS Ventura 13.1.
  • Wireshark GUI and window manager stuck after setting display filter.
  • Dissector bug, protocol H.261.
  • File extension heuristics are case-sensitive.
  • Symbolic links to packages in macOS dmg can’t be double-clicked to install on macOS 13.2.
  • Potential memory leak in tshark.c.
  • Fuzz job crash output: fuzz-2023-02-05-7303.pcap.
  • f5fileinfo: Hardware platforms missing descriptions.
  • The lines in the intelligent scrollbar are off by one.
  • Wireshark crashes on invalid UDS packet in Lua context.
  • TECMP dissector shows the wrong Voltage in Vendor Data.
  • UDS: Names of RDTCI subfunctions 0x0b …​ 0x0e are not correct.

To ensure optimal performance and security, it is strongly recommended that all users of this software upgrade to the latest version, which is now available as version 4.0.4. This version includes critical updates that address various issues and vulnerabilities discovered in earlier versions.

However, to get started with the latest version of this application, you can download it by clicking on this link.

Network Security Checklist – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats…

8 hours ago

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages DNS…

12 hours ago

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community due…

12 hours ago

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a…

12 hours ago

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have launched…

15 hours ago

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi telecommunications…

16 hours ago