A heap-based buffer overflow was found in the way Wireshark
processes signalling traces generated by Gammu (www.gammu.org)
from Nokia DCT3 phones in Netmonitor mode.
An attacker could use this flaw to cause wireshark executable
to crash or, potentially, execute arbitrary code with the privileges
of the user running wireshark, if the local user opened a
specially-crafted capture file.
The following upstream commit fixes this issue:
We'll work this in bug 354197.
According to http://www.wireshark.org/security/wnpa-sec-2011-04.html this is fixed in wireshark-1.4.4, I think it will be simpler to close it as a dupe then.
*** This bug has been marked as a duplicate of bug 354197 ***