The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6
does not validate the fragment offset before invoking the reassembly state
machine, which allows remote attackers to cause a denial of service
(application crash) via a large offset value that triggers write access to
an invalid memory location.
anonsvn.wireshark.org/viewvc?view=revision&revision=48011
www.wireshark.org/docs/relnotes/wireshark-1.6.14.html
www.wireshark.org/docs/relnotes/wireshark-1.8.6.html
www.wireshark.org/security/wnpa-sec-2013-22.html
bugs.wireshark.org/bugzilla/show_bug.cgi?id=8380
launchpad.net/bugs/cve/CVE-2013-2488
nvd.nist.gov/vuln/detail/CVE-2013-2488
security-tracker.debian.org/tracker/CVE-2013-2488
www.cve.org/CVERecord?id=CVE-2013-2488