Statement:
The versions of Wireshark as shipped with Red Hat Enterprise Linux 7 and earlier are not affected by this issue because the commit was introduced in later versions.
This flaw appears to be caused because the fAbstractSyntaxNType() function in epan/dissectors/packet-bacapp.c calls other functions such as fLogRecord(), fLogMultipleRecord(), fEventParameter(), which in turn call fAbstractSyntaxNType(). A malformed packet could create a condition in which the recursion depth would overflow the stack size because there was no limitation on recursion depth.