Wireshark 4.6.3 Released With Fixes for Crashes and Vulnerabilities

Related

Mississippi’s Cybersecurity Leadership Spotlight

Mississippi’s cybersecurity leadership spans banking, higher education, healthcare, and...

Idaho’s Cybersecurity Leadership Spotlight

Idaho’s cybersecurity leadership bench spans public institutions, courts, local...

Hawaii’s Cybersecurity Leadership Spotlight

Hawaii’s cybersecurity leadership stands out for its mix of...

Arkansas’ Cybersecurity Leadership Spotlight

Arkansas has built a cybersecurity leadership bench that reaches...

Share

What happened

Wireshark has released version 4.6.3 as a maintenance update addressing multiple stability issues and security-related flaws in the packet analysis tool. The release resolves four flaws in dissector and parser components that could lead to application crashes or denial-of-service conditions when processing malformed packets. Additional fixes address a Solaris build error, an RTP player stop failure, and data parsing issues affecting specific protocol fields. The update also includes improvements to protocol and capture file format support across platforms.

Who is affected

Users running versions of Wireshark prior to 4.6.3 are affected, including network administrators, security analysts, and developers who rely on the tool for troubleshooting, analysis, or educational purposes.

Why CISOs should care

Stability and vulnerability issues in widely used network analysis tools can disrupt investigative workflows and affect visibility during incident response and operational troubleshooting.

3 practical actions

  • Upgrade to Wireshark 4.6.3. Apply the updated release to replace earlier versions with known vulnerabilities.
  • Deploy updated installers across platforms. Ensure Windows, macOS, and Linux systems are running the fixed version.
  • Validate protocol parsing behavior. Confirm that corrected protocol handling functions as expected in operational use.