The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.
https://security.gentoo.org/glsa/201604-05
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11820
http://www.wireshark.org/security/wnpa-sec-2015-54.html