Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843
http://www.wireshark.org/security/wnpa-sec-2014-04.html
http://www.securitytracker.com/id/1029907
http://www.securityfocus.com/bid/66066
http://www.exploit-db.com/exploits/33069
http://www.debian.org/security/2014/dsa-2871
http://secunia.com/advisories/57489
http://secunia.com/advisories/57480
http://rhn.redhat.com/errata/RHSA-2014-0342.html
http://rhn.redhat.com/errata/RHSA-2014-0341.html
http://osvdb.org/show/osvdb/104199
http://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html
http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html