libtiff is vulnerable to heap-based buffer overflow vulnerability. Remote attackers can cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles. loadImage() function in tiffcrop.c. loadImage() will read the numbers of tiles by calling TIFFNumberOfTiles() which creates a potential attack vector via crafted tiff tiles, which may result in DoS or code execution.
bugzilla.maptools.org/show_bug.cgi?id=2543
lists.opensuse.org/opensuse-updates/2016-09/msg00039.html
rhn.redhat.com/errata/RHSA-2016-1546.html
rhn.redhat.com/errata/RHSA-2016-1547.html
www.debian.org/security/2017/dsa-3762
www.openwall.com/lists/oss-security/2016/04/12/3
www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/85996
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1326249
rhn.redhat.com/errata/RHSA-2016-1547.html
security.gentoo.org/glsa/201701-16