Thursday, February 13, 2025
HomeCyber Security NewsWireshark 4.4.3 Released: What's New!

Wireshark 4.4.3 Released: What’s New!

Published on

SIEM as a Service

Follow Us on Google News

The Wireshark development team announced the release of Wireshark version 4.4.3, a critical update that brings several bug fixes and enhancements to this widely used network protocol analyzer.

Renowned for its ability to troubleshoot, analyze, and educate users about network protocols, Wireshark continues to evolve, making it an indispensable tool for network professionals.

Key Bug Fixes

The latest version addresses a range of bugs that improve the stability and reliability of the software:

  • GSM MAP dissector: Fixed a potential mismatch involving uncertainty radius and its filter key, resolving Issue #20247.
  • User Location Information: Resolved an issue (Issue #20276) where the macro eNodeB ID and Extended Macro eNodeB ID were incorrectly decoded.
  • NFSv2 Dissector: Corrected an error that resulted in swapping Character Special File and Directory in mode decoding (Issue #20290).
  • VOIP Calls: Enhanced the display of call flows, ensuring they reflect accurate hour data (Issue #20311).

Numerous bugs related to various dissectors and functionalities were addressed, including issues with sFlow, fuzz jobs, and build settings, ensuring a more seamless user experience.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Enhanced Features

While the release does not introduce new protocol support, it includes significant updates to existing protocols:

  • Among the protocols updated are ARTNET, Diameter, HTTP2, and many others, enhancing their decoding accuracy and functionality with each release.
  • Additionally, the new capture file format support includes CLLog, EMS, and ERF, broadening the range of data sources that Wireshark can analyze.

Wireshark is developed by a dedicated team supported by the Wireshark Foundation, a nonprofit organization focused on promoting network protocol analysis and education.

The foundation encourages contributions from users and organizations alike, highlighting the communal effort behind maintaining and improving this vital tool.

Users can download the latest version of Wireshark from the official website, where they will also find comprehensive resources for installation and usage.

Most Linux and Unix vendors supply their own Wireshark packages, allowing for easy upgrades through system-specific package management systems.

With version 4.4.3, Wireshark continues to solidify its position as an essential tool for network analysis, troubleshooting, and education.

The enhancements and bug fixes not only streamline user experience but also contribute to improved performance in managing complex network protocols.

As always, the Wireshark team urges users to engage with the tool, report issues, and contribute to its ongoing development, ensuring it meets the evolving needs of network professionals worldwide.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical Chrome Flaw Allows Attackers to Remotely Execute Code

Google has released an urgent update for its Chrome browser to address a critical...

Global IoT Data Leak Exposes 2.7 Billion Records and Wi-Fi Passwords Worldwide

A massive security lapse has exposed over 2.7 billion records, including sensitive Wi-Fi credentials,...

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Critical Chrome Flaw Allows Attackers to Remotely Execute Code

Google has released an urgent update for its Chrome browser to address a critical...

Global IoT Data Leak Exposes 2.7 Billion Records and Wi-Fi Passwords Worldwide

A massive security lapse has exposed over 2.7 billion records, including sensitive Wi-Fi credentials,...

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...