An infinite loop was found in the way NFS dissector of the Wireshark network traffic analyzer processed certain NFS packets. If Wireshark read a malformed packet off a network or opened a malicious packet capture file, it could lead to denial of service (Wireshark hang). Reference: http://www.wireshark.org/security/wnpa-sec-2012-12.html
Though there is no news from upstream about the wrong bug mentioned in their advisory, looking at the commit logs suggests that the issue is actually: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7209
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 842531]