wireshark is vulnerable to arbitrary code execution. The vulnerability exists when wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark.
anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h
lists.fedoraproject.org/pipermail/package-announce/2010-March/036415.html
osvdb.org/61987
secunia.com/advisories/38257
secunia.com/advisories/38348
secunia.com/advisories/38829
www.debian.org/security/2010/dsa-1983
www.mandriva.com/security/advisories?name=MDVSA-2010:031
www.metasploit.com/modules/exploit/multi/misc/wireshark_lwres_getaddrbyname
www.openwall.com/lists/oss-security/2010/01/29/4
www.redhat.com/security/updates/classification/#moderate
www.securityfocus.com/bid/37985
www.securitytracker.com/id?1023516
www.vupen.com/english/advisories/2010/0239
www.wireshark.org/security/wnpa-sec-2009-05.html
www.wireshark.org/security/wnpa-sec-2009-08.html
www.wireshark.org/security/wnpa-sec-2010-01.html
www.wireshark.org/security/wnpa-sec-2010-02.html
access.redhat.com/errata/RHSA-2010:0360
exchange.xforce.ibmcloud.com/vulnerabilities/55951
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8490
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9933