A heap-based buffer overflow was found in the way Wireshark processes signalling traces generated by Gammu (www.gammu.org) from Nokia DCT3 phones in Netmonitor mode. An attacker could use this flaw to cause wireshark executable to crash or, potentially, execute arbitrary code with the privileges of the user running wireshark, if the local user opened a specially-crafted capture file. The following upstream commit fixes this issue: http://anonsvn.wireshark.org/viewvc?view=rev&revision=35953
We'll work this in bug 354197.
According to http://www.wireshark.org/security/wnpa-sec-2011-04.html this is fixed in wireshark-1.4.4, I think it will be simpler to close it as a dupe then. *** This bug has been marked as a duplicate of bug 354197 ***