The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
www.debian.org/security/2012/dsa-2529
www.mandriva.com/security/advisories?name=MDVSA-2012:143
www.openwall.com/lists/oss-security/2012/07/31/1
www.openwall.com/lists/oss-security/2012/07/31/2
www.ubuntu.com/usn/USN-1560-1
github.com/django/django
github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155
github.com/django/django/commit/b2eb4787a0fff9c9993b78be5c698e85108f3446
github.com/django/django/commit/c14f325c4eef628bc7bfd8873c3a72aeb0219141
github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6
github.com/django/django/commit/dd16b17099b7d86f27773df048c5014cf439b282
nvd.nist.gov/vuln/detail/CVE-2012-3444
www.djangoproject.com/weblog/2012/jul/30/security-releases-issued