Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/CyberSecurity News/Wireshark 4.6.3 Released With Vulnerabilities Dissector and Parser
CyberSecurity News

Wireshark 4.6.3 Released With Vulnerabilities Dissector and Parser

The Wireshark Foundation has officially released Wireshark 4.6.3, the latest update to the world’s most popular network protocol analyzer. Full details are available in the release notes. This...

David kimber
David kimber
January 30, 2026 3 Min Read
2 0

The Wireshark Foundation has officially released Wireshark 4.6.3, the latest update to the world’s most popular network protocol analyzer. Full details are available in the release notes.

This release is critical for network administrators, security analysts, and developers, as it addresses multiple security vulnerabilities that could lead to denial-of-service (DoS) conditions through dissector and parser crashes.

Given Wireshark’s widespread use in troubleshooting, software development, and educational contexts, these stability fixes are essential for maintaining reliable network visibility.

Wireshark is a cornerstone tool for inspecting network traffic, but its complex parsing engines can sometimes be susceptible to malformed packets.

The 4.6.3 update specifically targets flaws where crafted packets could trigger infinite loops or crash the application, effectively blinding a security team during an analysis session.

Security Vulnerabilities Fixed

The primary focus of this release is the remediation of four specific vulnerabilities identified in the dissector and parser modules. These flaws allow attackers to disrupt Wireshark operations by injecting malformed data into a network stream or capture file.

The following table details the security issues resolved in version 4.6.3:

Vulnerability ID Component Issue Type Reference
wnpa-sec-2026-01 BLF File Parser Application Crash Issue 20880
wnpa-sec-2026-02 IEEE 802.11 Dissector Dissector Crash Issue 20939
wnpa-sec-2026-03 SOME/IP-SD Dissector Dissector Crash Issue 20945
wnpa-sec-2026-04 HTTP3 Dissector Infinite Loop Issue 20944

The most notable among these is the HTTP3 dissector infinite loop (wnpa-sec-2026-04). Infinite loops are particularly dangerous in automated monitoring environments, as they can consume excessive CPU resources, rendering the analysis machine unresponsive.

Similarly, the crashes in the IEEE 802.11 (Wi-Fi) and SOME/IP-SD modules highlight the risks associated with analyzing wireless and automotive service-oriented protocols.

Bug Fixes and Stability

Beyond security patches, Wireshark 4.6.3 includes several functional improvements and bug fixes that enhance the user experience across different platforms.

  • Solaris Build Fix: A compilation error affecting Wireshark 4.6.0 on Solaris systems (related to pcapio.c) has been resolved, restoring compatibility for users on that infrastructure.
  • RTP Player: A frustrating bug where RTP player streams could not be stopped has been fixed, allowing for smoother analysis of VoIP traffic.
  • Data Parsing Errors: Issues with missing data in HomePlug messages and incorrect parsing of IEEE 802.11 QoS fields when A-MSDU is present have been corrected.
  • MaxMind DB: A crash occurring when switching profiles with MaxMind DB enabled or disabled has been patched.

As with every release, the Wireshark development team has updated support for a wide array of protocols to ensure accurate decoding of modern network traffic. New or updated support is available for:

  • Core Protocols: DHCP, SSH, HTTP3, and QUIC.
  • Telecommunications: LTE RRC, NAS-5GS, and H.248.
  • Industrial/IoT: HomePlug AV, SOME/IP-SD, and IEEE 802.11.

Additionally, capture file support has been improved for 3GPP TS 32.423 Trace, BLF, NetScreen, and Viavi Observer formats.

Wireshark is maintained by the Wireshark Foundation, a nonprofit dedicated to promoting protocol analysis education. The project relies on community contributions to sustain its development.

Professionals looking to deepen their expertise can attend SharkFest, the official developer and user conference, or pursue the Wireshark Certified Analyst credential.

Users are strongly advised to upgrade to Wireshark 4.6.3 immediately to mitigate the risks associated with the patched vulnerabilities. The installer and source code are available on the official Wireshark download page.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackPatchSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Weaponized VS Code Extension ClawdBot Agent Beware Named

Next Post

Hackers Weaponize Open VSX Extension with Weaponized Sophisticated

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us