Wireshark 4.6.3 Released With Fixes for Crashes and Vulnerabilities

Related

Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure

What happened Researchers uncovered a network of malicious domains designed...

Critical Ivanti Endpoint Manager Vulnerabilities Actively Exploited

What happened Ivanti disclosed two critical vulnerabilities affecting Endpoint Manager...

Hackers Weaponized Open VSX Extension With Sophisticated Malware

What happened A malicious software extension distributed through the Open...

3,280,081 Fortinet Devices Found Online With Exposed Web Properties

What happened A large-scale internet scan identified more than 3.28...

Wireshark 4.6.3 Released With Fixes for Crashes and Vulnerabilities

What happened Wireshark has released version 4.6.3 as a maintenance...

Share

What happened

Wireshark has released version 4.6.3 as a maintenance update addressing multiple stability issues and security-related flaws in the packet analysis tool. The release resolves four flaws in dissector and parser components that could lead to application crashes or denial-of-service conditions when processing malformed packets. Additional fixes address a Solaris build error, an RTP player stop failure, and data parsing issues affecting specific protocol fields. The update also includes improvements to protocol and capture file format support across platforms.

Who is affected

Users running versions of Wireshark prior to 4.6.3 are affected, including network administrators, security analysts, and developers who rely on the tool for troubleshooting, analysis, or educational purposes.

Why CISOs should care

Stability and vulnerability issues in widely used network analysis tools can disrupt investigative workflows and affect visibility during incident response and operational troubleshooting.

3 practical actions

  • Upgrade to Wireshark 4.6.3. Apply the updated release to replace earlier versions with known vulnerabilities.
  • Deploy updated installers across platforms. Ensure Windows, macOS, and Linux systems are running the fixed version.
  • Validate protocol parsing behavior. Confirm that corrected protocol handling functions as expected in operational use.