The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
https://security.gentoo.org/glsa/201510-03
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
http://www.wireshark.org/security/wnpa-sec-2015-17.html
http://www.securityfocus.com/bid/74631
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html