• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Wireshark 2.2.6 fixes more security flaws

3133

wireshark 2.2.6

The Wireshark 2.2.6 is the sixth update of the stable application has been released with more fixes for the newly discovered security flaws. Wireshark is a free and open source packet analyzer and network protocol analyzer along with scanner feature.

Wireshark is most widely used for network troubleshooting, analysis, software and communications protocol development. It uses the Qt widget toolkit and is platform independent.

There have been serious security flaws found in Wireshark recently. Some of the flaws include crashes in both IMAP and packetBB dissectors, infinite loops with WBXML dissector. Also found some flaws are Netscaler file parser, RPCoRDMA dissector, BDP dissector, DOF dissector, SLSK dissector, SIGCOMP dissector and WSP dissector.

Also updated in the Wireshark maintenance release are the MySQL, IEEE 802.11, SSL, SSH, SCCP, ASTERIX, BGP, HTTP, BSSGP, WASSP, BT AVRCP, BT HCI_CMD, BT HFP, BT PBAP, DNS, PacketBB, DOF, EAPOL-MKA, SIGCOMP, GIOP, GSM SMS, TAPA, ICMP, WSP, IMAP, NBIFOM, ISIS LSP, SLSK, iSNS, and T.30 protocols.

There was also support for Netscaler and pcapng capture file support. A total of 36 flaws were found and patched in Wireshark 2.2.6.

These crashes and security flaws were trying to topple the stable application. Wireshark however, has released a new update fixing and patching all the flaws. Wireshark has urged its users to update the new version as soon as possible.

Tags:
nicholas
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 5 )

Q

Is Wireshark safe to use?

A

Wireshark is safe to install so long as you get it from a trustworthy source, probably Wireshark itself for preference.

Q

How does the Wireshark work?

A

Wireshark and any packet sniffer work putting the Ethernet interface in promiscuous mode, receiving all the packets in the local network.

Q

How do you use Wireshark?

A

The following methods can be used to start capturing packets with Wireshark:
You can double-click on an interface in the main window.
You can get an overview of the available interfaces using the “Capture Interfaces” dialog box, Capture → Options

Q

What is the use of Wireshark in Linux?

A

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software, and communications protocol development.

Q

What is Wireshark promiscuous mode?

A

Promiscuous mode is a network interface mode in which the NIC reports every packet that it sees. So before you use this tool to draw conclusions about traffic on your Windows network, it's worth seeing if you're really capturing what you think you're capturing.

Related Tutorials in Wireshark 2.2.6 fixes more security flaws

Related Tutorials in Wireshark 2.2.6 fixes more security flaws

How to install Wireshark in Debian
How to install Wireshark in Debian
Mar 18, 2017
How to install Wireshark – 2.9.0 on Ubuntu – 18.04
How to install Wireshark – 2.9.0 on Ubuntu – 18.04
May 7, 2018
How to Install WireShark on Linuxmint 19
How to Install WireShark on Linuxmint 19
Jul 30, 2019
How to Install Wireshark on Fedora 34
How to Install Wireshark on Fedora 34
Feb 3, 2022
How to install Wireshark – 2.4.4 on Linux mint – 18.3
How to install Wireshark – 2.4.4 on Linux mint – 18.3
May 8, 2018
How to install Wireshark 2.2.5 on Ubuntu 16.04
How to install Wireshark 2.2.5 on Ubuntu 16.04
Mar 20, 2017
How to Monitor Network packet using Wireshark
How to Monitor Network packet using Wireshark
May 21, 2016
How to install Wireshark 2.2.6 latest version in Ubuntu 16.04
How to install Wireshark 2.2.6 latest version in Ubuntu 16.04
Apr 29, 2017

Related News in Wireshark 2.2.6 fixes more security flaws

Related News in Wireshark 2.2.6 fixes more security flaws

Wireshark 2.2.6 fixes more security flaws
Wireshark 2.2.6 fixes more security flaws
Apr 15, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Jayce ?
What are the types of table used in IPtables

What are the various types of table used in IPtables and how to use that for my server security?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.