Read heap overflow / invalid memory access in Wireshark (TFPA 007/2015)

This issue was reported to the Wireshark developers on May 5th. It was fixed in the 1.12.5 release of Wireshark, published on May 12th. The beta release 1.99.5 and the Git head code are not affected.
Apart from this issue Wireshark 1.12.5 fixes seven other security issues.
Wireshark 1.12.5 Release Notes
Wireshark bug #11188
Commit / fix
Sample pcap file triggering the overflow (test with tshark -r [input], can be seen with valgrind or address sanitizer)
CVE-2015-3815
Comments
Display comments as Linear | Threaded