libtiff is vulnerable to denial of service. Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files.
bugzilla.maptools.org/show_bug.cgi?id=2484
bugzilla.maptools.org/show_bug.cgi?id=2485
bugzilla.maptools.org/show_bug.cgi?id=2486
bugzilla.maptools.org/show_bug.cgi?id=2496
bugzilla.maptools.org/show_bug.cgi?id=2497
bugzilla.maptools.org/show_bug.cgi?id=2500
lists.opensuse.org/opensuse-updates/2015-03/msg00022.html
rhn.redhat.com/errata/RHSA-2016-1546.html
rhn.redhat.com/errata/RHSA-2016-1547.html
www.conostix.com/pub/adv/CVE-2014-8127-LibTIFF-Out-of-bounds_Reads.txt
www.debian.org/security/2015/dsa-3273
www.openwall.com/lists/oss-security/2015/01/24/15
www.securityfocus.com/bid/72323
www.securitytracker.com/id/1032760
access.redhat.com/errata/RHSA-2016:1546
access.redhat.com/errata/RHSA-2016:1547
access.redhat.com/security/cve/CVE-2014-8127
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1185805
rhn.redhat.com/errata/RHSA-2016-1547.html
security.gentoo.org/glsa/201701-16