Ubuntu Security Notice 3212-1 - It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
50e2487e59c9fd362a115544695941590f358ca4f554cabb42c9b3cff485021f
Gentoo Linux Security Advisory 201701-16 - Multiple vulnerabilities have been found in libTIFF, the worst of which may allow execution of arbitrary code. Versions less than 4.0.7 are affected.
cac656185fbc235b7c15ba927616d416942ad6b1eafdc7a99d3f5be8d70b9b78
Red Hat Security Advisory 2016-1547-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files.
ed518f90e6c9ad3adf207b0b3d18c196fe24aa28b1fe7abacc185d48bfa46c88
Red Hat Security Advisory 2016-1546-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files.
d6d08c83372856ace1e74e57bd70ff4119f60d17795f1b25721f1313504053f7
libtiff versions 4.0.6 and below suffer from a heap overflow vulnerability.
ddfd1c393297b02656c6af06e2fa4f16ca0f928fa45ec87e895588cb147b6756