A heap-based buffer overflow was found in the DECT dissector of
wireshark versions 1.4.0 to 1.4.4
A remote attacker could use this flaw to cause wireshark executable
to crash or, potentially, execute arbitrary code with the privileges
of the user running wireshark.
Upstream acknowledges Paul Makowski of SEI/CERT as the original
reporter of the issue.
Created wireshark tracking bugs for this issue
Affects: fedora-all [bug 697747]
This issue was addressed in Fedora 14 and Fedora 15 via:
Not vulnerable. This issue did not affect the versions of wireshark as
shipped with Red Hat Enterprise Linux 4, 5, or 6.