Marc Schoenefeld found a heap-based buffer overflow in Wireshark, when reading certain capture files. A remote attacker could use this flaw to cause wireshark executable to crash or, potentially, execute arbitrary code with the privileges of the user running wireshark, if the local user opened a specially-crafted capture file. This only affects wireshark < 1.2
Created attachment 474606 [details] patch
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2011:0370 https://rhn.redhat.com/errata/RHSA-2011-0370.html