Wireshark 3.2.7 Released With Fix for Security Vulnerabilities & New Features

https://gbhackers.com/wireshark-3-2-7/

It is used by network administrators to repair network and by the security, expert to examine the packets. It is a widely utilized tool in companies.

Npcap– A Nmap Projects package smelling (and sending out) library for Windows.Qt– widget toolkit for developing visual user interfaces.

With the new, the Windows installers now ship with Npcap 0.9997 & & Qt 5.12.9.

Wireshark 3.2.7 was released with a repair for security vulnerabilities and an upgraded variation of Npcap & & Qt. Wireshark is known as the worlds most popular network procedure analyzer. It is used for repairing, development, analysis, and education.

Wireshark 3.2.7

Security Vulnerabilities Fixed

CVE-2020-25863– MIME Multipart dissector crashCVE-2020-25862– TCP dissector crashCVE-2020-25866– BLIP dissector crash

By exploiting the vulnerabilities assaulters can crash Wireshark by injecting a malformed package onto the wire or by encouraging someone to read a malformed package trace file.

Other Bugs fixed;

HTTP dissector fails to display appropriate UTF-16 XML Bug 9069.
TFTP dissector does not track conversations properly. Source file and Destination File redundant or disagree. Bug 10305.
Dissector skips DICOM command Bug 13110.
Editcap time change does not work when both infile and outfile are ERF Bug 16578.
dissect_tds7_colmetadata_token() has incorrect return value if count is 0 Bug 16682.
” total block length … is too small” for Systemd Journal Export Block Bug 16734.
MNC 11 is revealing Mobile Network Code (MNC): NTT DoCoMo Tokai Inc. (11) But its belonging to Rakuten Network Bug 16755.
DICOM object extraction: inconsistency between tshark and wireshark Bug 16771.
S1-U information forwarding information and S103 PDN information forwarding details IEs showing improper value Bug 16777.
Wireshark crashes while opening a capture Bug 16780.
Altering choices by means of Decode As does not call callback Bug 16787.
Decoding of PFCP IE Remote GTP-U Peer is inaccurate Bug 16805.
Ng-enb not translated properly for Target Identification IE for GTPV2 Bug 16822.
The customer timestamp is parsed mistake for Google QUIC (version Q039) Bug 16839.
NAS-5G: PDU session reactivation result Bug 16842.
Wireshark stops working to detect libssh >>= 0.9.5 Bug 16845.

Protocols supported

Wireshark is understood as the worlds most popular network procedure analyzer. It is used for troubleshooting, analysis, education, and advancement.

Aeron, AFP, BLIP, BSSMAP, C12.22, DICOM, E. 212, GQUIC, GSM A RR, GTPv2, GVSP, IPX SAP, MIME Multipart, MMS, NAS-5GS, NCP, NDS, PFCP, PROFINET, Q. 708, Q. 933, RTCP, S1AP, TACACS+, TCP, TDS, X2AP, tds7, and xml

The new variation can be downloaded from here.

Training Course: Master in Wireshark Network Analysis — Hands-on course offers a complete network analysis Training utilizing Wireshark.

TFTP dissector does not track discussions properly. Bug 10305.

You can follow us on Linkedin, Twitter, Facebook for day-to-day Cybersecurity and hacking news updates.