It was found that Wireshark's DICOM dissector did not check for invalid
payload data unit length. A remote attacker could create a specially-crafted
capture file, which once opened, by a local, unsuspecting user could lead
to wireshark application hang / termination.
(upstream bug report)
This issue did NOT affect the versions of the wireshark package, as shipped
with Red Hat Enterprise Linux 4 and 5.
This issue affects the version of the wireshark package, as shipped
with Red Hat Enterprise Linux 6.
This issue affects the versions of the wireshark package, as shipped
with Fedora release of 13, 14, and 15.
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2012:0509 https://rhn.redhat.com/errata/RHSA-2012-0509.html
This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 4 or 5.