Marc Schoenefeld found a heap-based buffer overflow in Wireshark, when reading certain capture files.
A remote attacker could use this flaw to cause wireshark executable
to crash or, potentially, execute arbitrary code with the privileges
of the user running wireshark, if the local user opened a
specially-crafted capture file.
This only affects wireshark < 1.2
Created attachment 474606 [details]
This issue has been addressed in following products:
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 5
Via RHSA-2011:0370 https://rhn.redhat.com/errata/RHSA-2011-0370.html