• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Wireshark 2.2.6 fixes more security flaws

{{postValue.id}}

wireshark 2.2.6

The Wireshark 2.2.6 is the sixth update of the stable application has been released with more fixes for the newly discovered security flaws. Wireshark is a free and open source packet analyzer and network protocol analyzer along with scanner feature.

Wireshark is most widely used for network troubleshooting, analysis, software and communications protocol development. It uses the Qt widget toolkit and is platform independent.

There have been serious security flaws found in Wireshark recently. Some of the flaws include crashes in both IMAP and packetBB dissectors, infinite loops with WBXML dissector. Also found some flaws are Netscaler file parser, RPCoRDMA dissector, BDP dissector, DOF dissector, SLSK dissector, SIGCOMP dissector and WSP dissector.

Also updated in the Wireshark maintenance release are the MySQL, IEEE 802.11, SSL, SSH, SCCP, ASTERIX, BGP, HTTP, BSSGP, WASSP, BT AVRCP, BT HCI_CMD, BT HFP, BT PBAP, DNS, PacketBB, DOF, EAPOL-MKA, SIGCOMP, GIOP, GSM SMS, TAPA, ICMP, WSP, IMAP, NBIFOM, ISIS LSP, SLSK, iSNS, and T.30 protocols.

There was also support for Netscaler and pcapng capture file support. A total of 36 flaws were found and patched in Wireshark 2.2.6.

These crashes and security flaws were trying to topple the stable application. Wireshark however, has released a new update fixing and patching all the flaws. Wireshark has urged its users to update the new version as soon as possible.

Tags:
nicholas
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

Is Wireshark safe to use?

A

Wireshark is safe to install so long as you get it from a trustworthy source, probably Wireshark itself for preference.

Q

How does the Wireshark work?

A

Wireshark and any packet sniffer work putting the Ethernet interface in promiscuous mode, receiving all the packets in the local network.

Q

How do you use Wireshark?

A

The following methods can be used to start capturing packets with Wireshark:
You can double-click on an interface in the main window.
You can get an overview of the available interfaces using the “Capture Interfaces” dialog box, Capture → Options

Q

What is the use of Wireshark in Linux?

A

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software, and communications protocol development.

Q

What is Wireshark promiscuous mode?

A

Promiscuous mode is a network interface mode in which the NIC reports every packet that it sees. So before you use this tool to draw conclusions about traffic on your Windows network, it's worth seeing if you're really capturing what you think you're capturing.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help keel johnston ?
Unhide the folders on windows Explorer

Give any solutions to unhide folder using command prompt?

forum3

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.