Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Wireshark 4.4.4 Fixes DoS Vulnerability

February 25, 2025
Reading Time: 2 mins read
in News
EU Sanctions North Korean Linked to Lazarus

Wireshark Foundation has released version 4.4.4 of its popular network protocol analyzer, addressing a critical vulnerability (CVE-2025-1492) that could allow attackers to trigger denial-of-service (DoS) conditions. The flaw, affecting Wireshark versions 4.4.0 through 4.4.3 and 4.2.0 through 4.2.10, resides in the Bundle Protocol and CBOR dissectors. When specially crafted network traffic was processed, the vulnerability caused crashes, infinite loops, and memory leaks, leading to potential disruptions in network diagnostics and monitoring. This issue received a high severity rating of 7.8 on the CVSS v3.1 scale and was discovered through automated fuzz testing.

The new release aims to mitigate the risks of this vulnerability by addressing the flaw in the dissectors that decode network traffic.

Successful exploitation of this vulnerability could severely impact network forensics and intrusion detection, particularly in enterprise environments. The release not only fixes the critical flaw but also resolves 13 other bugs, including issues related to interface regressions, DNS query handling, and JA4 fingerprint inaccuracies. Wireshark emphasized the importance of updating immediately to avoid potential exploitation from malformed packet injection.

As part of their ongoing commitment to secure their protocol analysis tools, Wireshark’s maintainers urged users to upgrade to version 4.4.4 and validate capture files from untrusted sources. In addition to the fix for CVE-2025-1492, the release also includes enhanced stability for dissector modules, ensuring that edge-case vulnerabilities, such as those that have impacted Bluetooth and Radiotap in the past, are less likely to cause disruptions. The Wireshark Foundation recommended network segmentation and proper firewalls to further mitigate exposure to malicious traffic during the update process.

Wireshark continues to be an essential tool for network professionals, with over 80% of enterprises relying on it for traffic analysis. Despite facing challenges with architectural changes and bug fixes, such as the migration to Lua 5.4 and compatibility risks with zlib-ng, the Wireshark Foundation remains committed to improving the security and functionality of its software. The release of version 4.4.4 follows a series of security advisories in 2024, showcasing Wireshark’s proactive approach to addressing potential vulnerabilities and ensuring its continued role in network security.

Reference:
  • Wireshark 4.4.4 Release Fixes DoS Vulnerability and Improves Network Analysis Tools
Tags: Cyber NewsCyber News 2025Cyber threatsCybercriminalsFebruary 2025
ADVERTISEMENT

Related Posts

Microsoft Edge Adds Scareware Sensor

Apple Pay VP Unveils Wallet Updates

November 3, 2025
Microsoft Edge Adds Scareware Sensor

Meduza Stealer Malware Admins Arrested

November 3, 2025
Microsoft Edge Adds Scareware Sensor

Microsoft Edge Adds Scareware Sensor

November 3, 2025
Ukrainian Extradited Over Ransomware

Ukrainian Extradited Over Ransomware

October 31, 2025
Ukrainian Extradited Over Ransomware

Palantir Sues Ex Employees

October 31, 2025
Ukrainian Extradited Over Ransomware

Pixels Vulnerable To Cellebrite Hacking

October 31, 2025

Latest Alerts

HTTPTroy Backdoor Poses As VPN Invoice

China Linked Hackers Exploit Shortcut In

BankBot YNRK And DeliveryRAT Exposed

NFC Relay Malware Surge In Europe

Active Exploits Hit Dassault And XWiki

CISA And NSA Warn To Secure Microsoft

Subscribe to our newsletter

    Latest Incidents

    Penn Hacker Claims Major Data Breach

    FBI Says Rogue Workers Behind Hacks

    Hackers Extort 350K From Massage Clients

    Ribbon Breached By State Hackers

    EY Data Leak On Microsoft Azure

    Merkle Hit By Major Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial