Wireshark 3.4.10

With all-new features, protocols, and several bug fixes, Wireshark has released recently a new version of its free and open-source packet analyzer, that is Wireshark 3.4.10.

Wireshark is utilized for several purposes, as it is one of the world’s most widespread network protocol analyzers. And here below we have mentioned all the primary uses of Wireshark network protocol analyzers:-

  • Troubleshooting
  • Analysis
  • Development
  • Education

While the availability of Wireshark is complete, since, it is a free and open-source packet analyzer it runs on all the major operating systems like:-

  • Windows
  • Linux
  • macOS
  • BSD
  • Solaris
  • Some other Unix-like OS

What’s new in Wireshark 3.4.10?

The all-new version of Wireshark doesn’t offer any new protocols in this release (3.4.10), but this new version comes with newly updated protocol support, and here they are:-

  • BT SDP
  • BT-DHT
  • C12.22
  • CAN FD
  • CSN1
  • EVS
  • HTTP2
  • IDMP
  • IEEE 1905.1a
  • IEEE 802.11
  • Modbus
  • PNRP
  • TCP

Fixed Bugs and Vulnerabilities

Here below we have mentioned all the bugs and vulnerabilities that have been fixed in this new version:-

Fixed Bugs:

  • OSS-Fuzz: Heap-use-after-free in ROS Issue 16342.
  • Allow for ‘\0’ (NULL) character as filter instead of requiring 0x00 for the character match Issue 16525.
  • Dumpcap with threads reports double received count vs captured Issue 17089.
  • I/O Graphs values reset to default with 3.5 due to change of UAT Issue 17623.
  • HTTP2 dissector reports an assertion error on large data frames Issue 17633.
  • TShark stops capturing when capturing with multiple files and packet printing enabled Issue 17654.
  • Wireshark is unable to decode the IMSI IE received in BSSMAP Perform Location request Issue 17667.
  • WSLUA: Crash on reload if Proto has no fields Issue 17668.
  • Crash in flow analysis for TCP Issue 17722.

Fixed vulnerabilities:

  • wnpa-sec-2021-07 Bluetooth DHT dissector crash. Issue 17651. CVE-2021-39929.
  • wnpa-sec-2021-08 Bluetooth HCI_ISO dissector crash. Issue 17649. CVE-2021-39926.
  • wnpa-sec-2021-09 Bluetooth SDP dissector crash. Issue 17635. CVE-2021-39925.
  • wnpa-sec-2021-10 Bluetooth DHT dissector large loop. Issue 17677. CVE-2021-39924.
  • wnpa-sec-2021-11 PNRP dissector large loop. Issue 17684.
  • wnpa-sec-2021-12 C12.22 dissector crash. Issue 17636. CVE-2021-39922.
  • wnpa-sec-2021-13 IEEE 802.11 dissector crash. Issue 17704. CVE-2021-39928.
  • wnpa-sec-2021-14 Modbus dissector crash. Issue 17703. CVE-2021-39921.
  • wnpa-sec-2021-15 IPPUSB dissector crash. Issue 17705. CVE-2021-39920.

New and Updated Capture File Support

  • pcap

Vendor-supplied Packages

Generally, the vendors of operating systems like Linux and Unix do supply their own Wireshark packages, but, using the package management system you can usually install or upgrade the existing Wireshark version on your system.

Moreover, if needed then one can find on the download page of the Wireshark website the complete list of available third-party packages.

Now if we talk about the File Locations then Wireshark and TShark, both look in different locations for the following things:-

  • Preference files
  • Plugins
  • RADIUS dictionaries

However, from platform to platform all these locations vary, and if you want then you can find the default locations on your system by using the About -> Folders.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.