The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687
http://www.securityfocus.com/bid/12762
http://www.redhat.com/support/errata/RHSA-2005-306.html
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:053
http://www.gentoo.org/security/en/glsa/glsa-200503-16.xml
http://www.ethereal.com/appnotes/enpa-sa-00018.html
http://www.debian.org/security/2005/dsa-718
http://security.lss.hr/index.php?page=details&ID=LSS-2005-03-05
http://marc.info/?l=bugtraq&m=111066805726551&w=2
http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707