epan/dissectors/packet-ldap.c in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (memory consumption) via (1) a long LDAP filter string or (2) an LDAP filter string containing many elements.
anonsvn.wireshark.org/viewvc?view=rev&revision=36101
lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
secunia.com/advisories/43759
secunia.com/advisories/43795
secunia.com/advisories/43821
www.debian.org/security/2011/dsa-2201
www.kb.cert.org/vuls/id/215900
www.mandriva.com/security/advisories?name=MDVSA-2011:044
www.redhat.com/support/errata/RHSA-2011-0369.html
www.redhat.com/support/errata/RHSA-2011-0370.html
www.securitytracker.com/id?1025148
www.vupen.com/english/advisories/2011/0622
www.vupen.com/english/advisories/2011/0719
www.vupen.com/english/advisories/2011/0747
www.wireshark.org/docs/relnotes/wireshark-1.2.15.html
www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
www.wireshark.org/security/wnpa-sec-2011-03.html
www.wireshark.org/security/wnpa-sec-2011-04.html
bugs.wireshark.org/bugzilla/show_bug.cgi?id=5732
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14974