This indicates an attempt to exploit a Insecure Search Path vulnerability in Wireshark.
The vulnerability is due to the vulnerable application's failure to sanitize user-supplied input. A remote attacker can exploit this by enticing a user to open a specially crafted pcap file. Successful exploitation may allow attackers to execute arbitrary lua scripts in the context of the running application.
Wireshark Foundation Wireshark 1.4.8 and prior
Wireshark Foundation Wireshark 1.6.1 and prior
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply patches or fixes, available from the website: