Wireshark contains a buffer overflow condition in the NTLMSSP dissector. The issue is triggered as user-supplied input is not properly validated when parsing a specially crafted packet. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially execution of arbitrary code.