March 7, 2017 By Larry Loeb 2 min read

Wireshark, a popular multiplatform network protocol analyzer, is widely used around the world for network analysis, troubleshooting and development.

For the past month, the Wireshark development team has been busy under the hood of the open-source software. On March 3, it released Wireshark 2.2.5 to address problems that were identified in the previous update, which was issued a mere 40 days prior.

Bugging Out

While the latest version didn’t introduce any new features, it did squash plenty of bugs. According to Wireshark’s release notes, the update patched vulnerabilities in the 64- and 32-bit Windows installers that could have led to a dynamic link libraries (DLL) hijacking.

Additionally, the development team repaired the LDSS dissector and NetScaler file parser, both of which crashed in the previous version. It also fixed the RTMTP, WSP and IAX2 dissectors, the STANAG 4607 and NetScaler file parsers, which were stuck in infinite loops and stomped a bug that caused the K12 file parser to crash. Softpedia also noted that this version of Wireshark features more robust support for a range network protocols.

The update addressed more than a dozen specific flaws, according to the release notes. For example, the developers repaired a display filter text box that had previously lost focus during live capturing, as well as a bug that caused the software to crash when saving or opening pcaps or exporting specified packets. They also fixed flaws that caused the program to display UTF-8 characters in the packet list column title and decode the EAP AKA improperly.

More Known Network Protocol Analyzer Problems

Additionally, the developers made improvements to the GPRS-NS message, which was previously written in octal instead of hexadecimal; the dumpcap, which crashed during rpcap setup; and the UMTS MAC dissector. Finally, Wireshark repaired several segmentation faults and fixed a bug that caused the program to crash upon closing an SNMP capture file if credentials were present.

While these fixes all represent good housekeeping, the Wireshark team admitted it had yet to patch some known problems. One of these flaws prevents the dumpcap from quitting in the event of a crash. Fortunately for users, however, there are no showstoppers on the list of outstanding issues.

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today