March 7, 2017 By Larry Loeb 2 min read

Wireshark, a popular multiplatform network protocol analyzer, is widely used around the world for network analysis, troubleshooting and development.

For the past month, the Wireshark development team has been busy under the hood of the open-source software. On March 3, it released Wireshark 2.2.5 to address problems that were identified in the previous update, which was issued a mere 40 days prior.

Bugging Out

While the latest version didn’t introduce any new features, it did squash plenty of bugs. According to Wireshark’s release notes, the update patched vulnerabilities in the 64- and 32-bit Windows installers that could have led to a dynamic link libraries (DLL) hijacking.

Additionally, the development team repaired the LDSS dissector and NetScaler file parser, both of which crashed in the previous version. It also fixed the RTMTP, WSP and IAX2 dissectors, the STANAG 4607 and NetScaler file parsers, which were stuck in infinite loops and stomped a bug that caused the K12 file parser to crash. Softpedia also noted that this version of Wireshark features more robust support for a range network protocols.

The update addressed more than a dozen specific flaws, according to the release notes. For example, the developers repaired a display filter text box that had previously lost focus during live capturing, as well as a bug that caused the software to crash when saving or opening pcaps or exporting specified packets. They also fixed flaws that caused the program to display UTF-8 characters in the packet list column title and decode the EAP AKA improperly.

More Known Network Protocol Analyzer Problems

Additionally, the developers made improvements to the GPRS-NS message, which was previously written in octal instead of hexadecimal; the dumpcap, which crashed during rpcap setup; and the UMTS MAC dissector. Finally, Wireshark repaired several segmentation faults and fixed a bug that caused the program to crash upon closing an SNMP capture file if credentials were present.

While these fixes all represent good housekeeping, the Wireshark team admitted it had yet to patch some known problems. One of these flaws prevents the dumpcap from quitting in the event of a crash. Fortunately for users, however, there are no showstoppers on the list of outstanding issues.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today