Security updates: Attackers can cause Wireshark to crash
The Wireshark developers have closed a security gap in their network analysis tool.
(Image: Alfa Photo/Shutterstock.com)
Anyone examining network traffic with Wireshark should update the tool promptly. If this is not done, attackers can attack systems. In the current version, the developers have closed a security gap and fixed several bugs.
Avoid crashes by updating
Wireshark 4.4.4 is now available for download. The closed vulnerability (CVE-2025-1492"high") affects Wireshark 4.4.0 up to and including 4.4.3 and 4.2. up to and including 4.2.10.
In a post about the vulnerability, the developers write that attackers can cause the "Bundle Protocol" and "CBOR dissectors" components to crash. In order to trigger such a DoS state, however, victims must process a package prepared by attackers with the tool. Attackers should also be able to inject such packets via packet injection in an unspecified way.
Videos by heise
In addition to the security patch, the developers have also solved several problems in Wireshark. For example, TShark now processes addresses in custom host files correctly. Other fixed bugs are listed in the changelog.
(des)