wireshark is vulnerable to arbitrary code execution. The vulnerability exists as when Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark.
anonsvn.wireshark.org/viewvc?view=revision&revision=41008
lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html
lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html
lists.opensuse.org/opensuse-updates/2012-04/msg00060.html
secunia.com/advisories/48548
secunia.com/advisories/48947
secunia.com/advisories/48986
www.openwall.com/lists/oss-security/2012/03/28/13
www.securityfocus.com/bid/52737
www.securitytracker.com/id?1026874
www.wireshark.org/news/20120327.html
www.wireshark.org/security/wnpa-sec-2012-06.html
access.redhat.com/errata/RHSA-2012:0509
access.redhat.com/security/cve/CVE-2012-1595
access.redhat.com/security/updates/classification/#moderate
bugs.wireshark.org/bugzilla/show_bug.cgi?id=6804
bugzilla.redhat.com/show_bug.cgi?id=807644
exchange.xforce.ibmcloud.com/vulnerabilities/74364
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15548