Wireshark 4.6.4 Released With Fix for Multiple Security Vulnerabilities


The Wireshark Foundation has officially released Wireshark 4.6.4, a significant maintenance update for the world’s most popular network protocol analyzer.

This release addresses multiple security vulnerabilities and resolves various functional bugs that could impact stability and performance.

Network administrators, security analysts, and developers rely on Wireshark for troubleshooting and education.

This update is particularly critical because it fixes flaws that could expose users to Denial-of-Service (DoS) attacks via specific protocol dissectors.

The 4.6.4 release resolves three specific security issues identified in previous versions. These vulnerabilities involve memory exhaustion and crash loops in protocol dissectors, the components Wireshark uses to decode network traffic.

Vulnerability / IssueDescription
USB HID Dissector Memory ExhaustionMalformed USB HID packets could cause excessive memory usage, leading to crashes or instability.
NTS-KE Dissector CrashSpecific Network Time Security Key Establishment traffic patterns could cause analyzer crashes.
RF4CE Profile Dissector CrashStability issue fixed to prevent crashes when analyzing RF4CE (Radio Frequency for Consumer Electronics) traffic.

Key Bug Fixes and Performance Improvements

Beyond security patches, Wireshark 4.6.4 delivers important stability fixes.

google

A notable performance issue regarding “Expert Info” has been resolved; previously, this feature suffered from quadratic performance degradation, becoming significantly slower as data volume increased.

Additional technical fixes include:

CategoryFix / Improvement
TShark StabilityFixed segmentation faults in TShark and editcap when output format set to BLF.
Capture File IntegrityCorrected Wiretap writing of invalid PCAPNG Darwin option blocks and custom string options.
Dissector CorrectionsResolved TDS desynchronization and fixed RDM status decoding in Art-Net PollReply dissector.
Fuzzing CrashesFixed crash discovered during Zigbee Direct Tunneling fuzz testing.

While no new protocols were introduced in this release, support for a wide array of existing protocols has been updated to ensure accurate decoding.

Updated protocols include Art-Net, BGP, IEEE 802.11, IPv6, MySQL, NAS-5GS, and Socks. Capture file support has also been improved for BLF and pcapng formats.

Users are advised to update to Wireshark 4.6.4 immediately to ensure their analysis environment is secure and stable. The latest version can be downloaded directly from the Wireshark Foundation website.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link