ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark 1.8.4 Release Notes


What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education.

What's New

Bug Fixes

The following vulnerabilities have been fixed.

  • wnpa-sec-2012-30

    Wireshark could leak potentially sensitive host name resolution information when working with multiple pcap-ng files. Discovered by Laura Chappell.

    Versions affected: 1.8.0 to 1.8.3.

  • wnpa-sec-2012-31

    The USB dissector could go into an infinite loop. (Bug 7787)

    Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.

  • wnpa-sec-2012-32

    The sFlow dissector could go into an infinite loop. (Bug 7789)

    Versions affected: 1.8.0 to 1.8.3.

  • wnpa-sec-2012-33

    The SCTP dissector could go into an infinite loop. (Bug 7802)

    Versions affected: 1.8.0 to 1.8.3.

  • wnpa-sec-2012-34

    The EIGRP dissector could go into an infinite loop. (Bug 7800)

    Versions affected: 1.8.0 to 1.8.3.

  • wnpa-sec-2012-35

    The ISAKMP dissector could crash. (Bug 7855)

    Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.

  • wnpa-sec-2012-36

    The iSCSI dissector could go into an infinite loop. (Bug 7858)

    Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.

  • wnpa-sec-2012-37

    The WTP dissector could go into an infinite loop. (Bug 7869)

    Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.

  • wnpa-sec-2012-38

    The RTCP dissector could go into an infinite loop. (Bug 7879)

    Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.

  • wnpa-sec-2012-39

    The 3GPP2 A11 dissector could go into an infinite loop. (Bug 7801)

    Versions affected: 1.8.0 to 1.8.3.

  • wnpa-sec-2012-40

    The ICMPv6 dissector could go into an infinite loop. (Bug 7844)

    Versions affected: 1.8.0 to 1.8.3, 1.6.0 to 1.6.11.

The following bugs have been fixed:

  • Menu and Title bars inaccessible using GTK2 (non-legacy) with two monitors. (Bug 553)

  • 802.11 Probe Response fails to parse. (Bug 1284)

  • Tshark - decimal symbol. (Bug 2880)

  • Malformed tpncp.dat file can crash Wireshark. (Bug 6665)

  • SSL decryption not work even with example capture file and key. (Bug 6869)

  • Info line is incorrect on SIP message containing another SIP message in body. (Bug 7780)

  • OOPS: dissector table "sctp.ppi" doesn't exist Protocol being registered is "Datagram Transport Layer Security". (Bug 7784)

  • Dissection of IEEE 802.11 Channel Switch Announcement element fails. (Bug 7797)

  • Invalid memory accesses when loading RADIUS captures. (Bug 7803)

  • ISUP CIC should have format BASE_DEC, not BASE_HEX. (Bug 7848)

  • We don't handle pcap-ng files with IDBs that come after packet blocks. (Bug 7851)

  • '*' wildcard in the 'Src IP' or 'Dest IP' field of the ESP SA dialog does not work. (Bug 7866)

  • nas_eps dissector does not decode some esm message. (Bug 7912)

  • WLAN decryption status not updated after updating WEP/WPA keys. (Bug 7921)

  • IPv6 Option Pad1 Incorrect dissection. (Bug 7938)

  • Print GNUTLS error message if PEM import fails. (Bug 7948)

  • GSM classmark3 8-PSK decode error. (Bug 7964)

  • Parsing the Server Name Indication extension in SSL/TLS traffic reads some fields incorrectly. (Bug 7967)

  • Lua code crashes wireshark after update to 1.8.3. (Bug 7976)

  • 2 bugs in Ran-Information-Error Rim Container. (Bug 8000)

  • Misspelling (typo) in IPv6 display filter field name. (Bug 8006)

  • Two BSSGP dissector bugs. (Bug 8008)

  • Core dump during SCTP association analysis. (Bug 8011)

New and Updated Features

There are no new features in this release.

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

3GPP2 A11, BSSGP, EIGRP, FMP/NOTIFY, GSM A, ICMP, ICMPv6, IEEE 802.11, IPsec, IPv6, ISAKMP, iSCSI, LTE RRC, NAS EPS, NDPS, Prism, RADIUS, RRC, RTCP, SCTP, sFlow, SIP, SMB2, SSL/TLS, TPNCP, USB

New and Updated Capture File Support

CommView NCF, iSeries, pcap-ng.

Getting Wireshark

Wireshark source code and installation packages are available from http://www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system.

Known Problems

Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

The BER dissector might infinitely loop. (Bug 1516)

Capture filters aren't applied when capturing from named pipes. (Bug 1814)

Filtering tshark captures with display filters (-R) no longer works. (Bug 2234)

The 64-bit Windows installer does not support Kerberos decryption. (Win64 development page)

Application crash when changing real-time option. (Bug 4035)

Hex pane display issue after startup. (Bug 4056)

Packet list rows are oversized. (Bug 4357)

Summary pane selected frame highlighting not maintained. (Bug 4445)

Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985)

Getting Help

Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site.

Official Wireshark training and certification are available from Wireshark University.

Frequently Asked Questions

A complete FAQ is available on the Wireshark web site.