Wireshark, the popular network protocol analyzer, has reached version 4.4.2. It is used for troubleshooting, analysis, development and education.
The following vulnerabilities have been fixed:
- wnpa-sec-2024-14 FiveCo RAP dissector infinite loop.
- wnpa-sec-2024-15 ECMP dissector crash.
Updated protocol support: ARTNET, ASN.1 PER, BACapp, BT BR/EDR, CQL, DOF, ECMP, ENIP, FiveCo RAP, Frame, FTDI FT, HSRP, HTTP/2, ICMPv6, IEEE 802.11, MBTCP, MMS, MPEG PES, PN-DCP, POP, ProtoBuf, PTP, RPC, RTCP, SIP, SRT, Syslog, TCP, UMTS RLC, USB CCID, Wi-SUN, and ZigBee ZCL.
The following bugs have been fixed:
- CIP I/O is not detected by “enip” filter anymore.
- Fuzz job issue: fuzz-2024-09-03-7550.pcap. Issue 20041.
- OSS-Fuzz 71476: wireshark:fuzzshark_ip_proto-udp: Index-out-of-bounds in DOFObjectID_Create_Unmarshal.
- JA4_c hashes an empty field to e3b0c44298fc when it should be 000000000000.
- Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone Mirroring.
- PTP analysis loses track of message associations in case of sequence number resets.
- USB CCID: response packet in case SetParameters command is unsupported is flagged as malformed.
- dumpcap crashes when run from TShark with a capture filter. Issue 20108.
- SRT dissector: The StreamID (SID) in the handshake extension is displayed without regarding the control characters and with NUL as terminating.
- Ghost error message on POP3 packets.
- Building against c-ares 1.34 fails.
- D-Bus is not optional anymore.
- macOS Intel DMGs aren’t fully notarized.
- Incorrect name for MLD Capabilities and Operations Present flag in dissection of MLD Capabilities for MLO wifi-7 capture.
- CQL Malformed Packet v4 S → C Type RESULT: Prepared[Malformed Packet]
- Wi-Fi: 256 Block Ack (BA) is not parsed properly.
- BACnet ReadPropertyMultiple request Maximum allowed recursion depth reached.
- Statistics→I/O Graph crashes when using simple moving average.
- HTTP2 body decompression fails on DATA with a single padded frame.
- Compiler warning for ui/tap-rtp-common.c (ignoring return value)
- SIP dissector bug due to “be-route” param in VIA header.
- Coredump after trying to open ‘Follow TCP stream’.
- Protobuf JSON mapping error.
- Display filter “!stp.pvst.origvlan in { vlan.id }” causes a crash (Version 4.4.1).
- Extcap plugins shipped with Wireshark Portable are not found in version 4.4.1.
- IEEE 802.11be: Wrong regulatory info in HE Operation IE in Beacon frame.
- Wireshark 4.4.1 does not decode RTCP packets.
- Qt: Display filter sub-menu can only be opened on the triangle, not the full name.
- Qt: Changing the display filter does not update the Conversations or Endpoints dialogs.
- MODBUS Dissector bug.
- Modbus dissector bug – Field Occurence and Layer Operator modbus.bitval field.
- Wireshark crashes when a field is dragged from packet details towards the find input.
- Lua DissectorTable(“”) : set (“10,11”) unexpected behavior in locales with comma as decimal separator.
Wireshark is available for free download here.