epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before 2.0.2 does not limit the amount of header data, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
https://security.gentoo.org/glsa/201604-05
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077