The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707
marc.info/?l=bugtraq&m=111066805726551&w=2
security.lss.hr/index.php?page=details&ID=LSS-2005-03-05
www.debian.org/security/2005/dsa-718
www.ethereal.com/appnotes/enpa-sa-00018.html
www.gentoo.org/security/en/glsa/glsa-200503-16.xml
www.mandriva.com/security/advisories?name=MDKSA-2005:053
www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
www.redhat.com/support/errata/RHSA-2005-306.html
www.securityfocus.com/bid/12762
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687