Ben Schmidt discovered a buffer overflow flaw in the Wireshark RTPS dissector. Wireshark could crash if it read a malformed packet off a network, or opened a malicious dump file. This issue affects Wireshark versions 1.10.0 to 1.10.1 and 1.8.0 to 1.8.9. It is fixed in versions 1.10.2 and 1.8.10. References: https://www.wireshark.org/security/wnpa-sec-2013-57.html
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1007261]
Upstream bug: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9019 (currently closed) Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=51213
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the version of wireshark as shipped with Fedora 18 and 19.
I dont have access to the closed bug or the cap file, so this one will need to be SanityOnly