The TCP reassembly functionality in libnids before 1.18 allows remote attackers to cause "memory corruption" and possibly execute arbitrary code via "overlarge TCP packets."
http://www.debian.org/security/2004/dsa-410
http://sourceforge.net/project/shownotes.php?release_id=191323
http://secunia.com/advisories/10543
http://marc.info/?l=bugtraq&m=106728224210446&w=2
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000773