Wireshark 4.0.7 Released – What’s New!

Wireshark, One of the world’s most popular network packet analyzers, released Wireshark 4.0.7 with bug fixes, updated protocol support, and enhancements.

Wireshark is an application that captures packets from a network link, like the one between your computer and your home office or the internet.

In a standard Ethernet network, a packet is a data unit that can be sent and received independently. The most widely used packet sniffer in the world is Wireshark.

Wireshark is one of the most popular network security tools to analyze network protocols, including IP, TCP, UDP, HTTP, SSL/TLS, FTPDNSDHCP, and many more.

https://cybersecuritynews.com/wireshark

The packet analyzer Wireshark is a crucial tool for organizations of all sizes and types since network administrators and security professionals use it to investigate network traffic and detect vulnerabilities.

Wireshark 4.0.7 Updates

Bugs Patched:

  • Crash when (re)loading a capture file after renaming a dfilter macro. Issue 13753.
  • Moving a column deselects selected packet and moves to beginning of packet list. Issue 16251.
  • If you set the default interface in the preferences, it doesn’t work with TShark. Issue 16593.
  • Severe performance issues in Follow → Save As raw workflow. Issue 17313.
  • TShark doesn’t support the tab character as an aggregator character in \”-T fields\” Issue 18002.
  • On Windows clicking on a link in the ‘Software Update’ window launches, now unsupported, MS Internet Explorer. Issue 18488.
  • Wireshark 4.x.x on Win10-x64 crashes after saving a file with a name already in use. Issue 18679.
  • NAS-5GS Operator-defined Access Category: Multiple Criteria values not displayed in dissected packet display. Issue 18941.
  • Server Hello Packet Invisible – during 802.1x Authentication- from Wireshark App Version 4.0.3 (v4.0.3-0-gc552f74cdc23) & above. Issue 19071.
  • TShark reassembled data is incomplete/truncated. Issue 19107.
  • CQL protocol parsing issues with Result frames from open source Cassandra. Issue 19119.
  • TLS 1.3 second Key Update doesn’t work. Issue 19120.
  • HTTP2 dissector reports an assertion error on large data frames. Issue 19121.
  • epan: Single letter hostnames aren’t displayed correctly. Issue 19137.
  • BLF: CAN-FD-Message format is missing a field. Issue 19146.
  • BLF: last parameter of LIN-Message is not mandatory (BUGFIX) Issue 19147.
  • PPP IPv6CP: Incorrect payload length warning. Issue 19149.
  • INSTALL file needs to be updated for Debian. Issue 19167.
  • Some RTP streams make Wireshark crash when trying to play stream. Issue 19170.
  • Wrong ordering in OpenFlow 1.0 Datapath unique ID. Issue 19172.
  • Incorrect mask in RTCP slice picture ID. Issue 19182.
  • Dissection error in AMQP 1.0. Issue 19191.

Vulnerabilities Addressed:

Wireshark 4.0.7 comes with the fixes for the security issues below:-

Updated Protocol Support

9P, AMQP, BGP, CQL, DHCPFO, EAP, GlusterFS, GSM MAP, HTTP2, iSCSI, Kafka, Kerberos, NAN, NAS-5GS, OCP.1, OpenFlow 1.0, PDCP-NR, PEAP, PPPoE, RSL, RTCP, rtnetlink, and XMPP.

For more information on the release, visit the Wireshark 4.0.7 release notes page.

If you’re running Wireshark on macOS and upgraded to macOS 13 from an earlier version, you might have to open and run the “Uninstall ChmodBPF” package, then open and run “Install ChmodBPF” in order to reset the ChmodBPF Launch Daemon. Issue 18734. Wireshark team said.

Learn Master in Wireshark Network Analysis – Wireshark Network Analysis Course Bundle

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

57 minutes ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

58 minutes ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

60 minutes ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

1 hour ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

1 day ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

1 day ago