epan/dissectors/packet-ldap.c in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (memory consumption) via (1) a long LDAP filter string or (2) an LDAP filter string containing many elements.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14974
http://www.wireshark.org/security/wnpa-sec-2011-04.html
http://www.wireshark.org/security/wnpa-sec-2011-03.html
http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html
http://www.vupen.com/english/advisories/2011/0747
http://www.vupen.com/english/advisories/2011/0719
http://www.vupen.com/english/advisories/2011/0622
http://www.securitytracker.com/id?1025148
http://www.redhat.com/support/errata/RHSA-2011-0370.html
http://www.redhat.com/support/errata/RHSA-2011-0369.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:044
http://www.kb.cert.org/vuls/id/215900
http://www.debian.org/security/2011/dsa-2201
http://secunia.com/advisories/43821
http://secunia.com/advisories/43795
http://secunia.com/advisories/43759
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html