Wednesday, February 26, 2025
Homecyber securityWireshark 4.4.2 Released: What's New!

Wireshark 4.4.2 Released: What’s New!

Published on

SIEM as a Service

Follow Us on Google News

The Wireshark Foundation has officially announced the release of Wireshark 4.4.2, the latest version of the world’s most popular network protocol analyzer.

Wireshark is wide use in troubleshooting, analysis, development, and educational purposes, Wireshark continues to be a vital tool for network professionals and enthusiasts.

The nonprofit Wireshark Foundation, which promotes protocol analysis education, emphasizes the importance of community contributions to sustain its work.

Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar

Major Bug Fixes and Security Updates

The release focuses on resolving several security vulnerabilities and bugs:

Security Fixes

  • wnpa-sec-2024-14: Fixed an infinite loop issue in the FiveCo RAP dissector (Issue 20176).
  • wnpa-sec-2024-15: Resolved a crash in the ECMP dissector (Issue 20214).

Notable Bug Fixes

  • Resolved an issue where CIP I/O was no longer detected by the “enip” filter (Issue 19517).
  • Fixed crashes related to dumpcap when run from TShark with a capture filter (Issue 20108).
  • Corrected improper parsing of Wi-Fi 256 Block Ack (BA) frames (Issue 20156).
  • Addressed a crash when using the “Follow TCP stream” feature (Issue 20174).
  • Fixed decompression failures for HTTP/2 bodies with padded frames (Issue 20167).
  • Corrected statistics-related crashes in the I/O Graph when using the simple moving average (Issue 20163).
  • Enhanced stability for macOS users by addressing interface disconnections and DMG notarization issues (Issues 20082 and 20129).

Other fixes included improvements to protocol dissectors such as SIP (Session Initiation Protocol), Modbus, and USB CCID, along with addressing various user interface issues, including crashes when dragging fields in the packet details view.

New Features and Updates

While no new protocols were introduced in this version, several existing protocols received updates, including:

  • Updated Protocol Support: ARTNET, BACapp, HTTP/2, IEEE 802.11, SIP, TCP, and more.
  • Improved Capture File Support: Enhanced BLF file decoding.

Additionally, display filters now handle floating-point conversion errors more accurately, and the Lua API has been updated to support comma-separated ranges in various locales.

TShark Syntax Changes

A notable improvement for TShark users is the updated syntax for dumping fields with a specific prefix. The command has been changed from -G fields prefix to -G fields,prefix, allowing more flexibility and compatibility with configuration profiles.

Previous Enhancements in Wireshark 4.4.0

Released earlier, Wireshark 4.4.0 introduced several significant improvements:

  • Automatic profile switching, enabling Wireshark to adapt profiles based on captured file filters.
  • Support for Lua 5.3 and 5.4, enhancing scripting capabilities.
  • Custom column creation using advanced field expressions, arithmetic calculations, and protocol modifiers.

The 4.4.0 version also boasted performance improvements, such as building with zlib-ng for faster compressed file handling.

How to Get Wireshark 4.4.2

Wireshark’s source code and installation packages are available for download at wireshark.org/download. Linux and Unix users can also check their platform-specific package management systems for updates.

With its focus on reliability and security, Wireshark 4.4.2 is a recommended update for all users.

Those interested in supporting the project can do so by visiting wiresharkfoundation.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...