Cyware Social will be sunset on April 15, 2026. The service is being replaced by Cyware’s Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us here → for more details.

Go to listing page

Multiple Vulnerabilities Fixed in Wireshark 3.0.4 Release

Multiple Vulnerabilities Fixed in Wireshark 3.0.4 Release
  • Wireshark 3.0.4 and 2.6.11 were released with vulnerabilities fixed from the previous versions.
  • Windows installers now ships with Npcap 0.9983 and the macOS installer ships with Qt 5.12.3.

New in the update: One of the most popular network protocol analyzer, Wireshark has rolled out new update/fix to safeguard its platform from cybercriminals.

  • Previously shipped with Npcap 0.996, windows installers now ship with Npcap 0.9983
  • Previously shipped with Qt 5.12.4, macOS installer now ships with Qt 5.12.3
  • The protocols supported by Wireshark 3.0.4 now include BACnet, DCERPC, DNS, LSD, NFS, FC-dNS, Gryphon, EAP, IEEE 802.11, and Radiotap
  • The supported file formats are CommView and PacketLogger

Discussing security vulnerabilities: The vulnerability “wnpa-sec-2019-21 – Gryphon dissector infinite loop” lets a remote attacker inject a malformed packet to perform a denial of service (DoS) attack.

  • The vulnerability exists due to the infinite loop in Gryphon dissector while processing network packets.
  • This leads to the consumption of excessive system resources including GPU.
  • The vulnerable Wireshark versions include: 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 3.0.0, 3.0.1, 3.0.2, and 3.0.3.

The updated version fixes it all. Wireshark source code and installation packages are available here.

Cyware Publisher

Publisher

Cyware