Buffer overflow in the TIFF reader in gui/image/qtiffhandler.cpp in Qt 4.7.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the TIFFTAG_SAMPLESPERPIXEL tag in a greyscale TIFF image with multiple samples per pixel.
https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465
https://hermes.opensuse.org/messages/12056605
https://exchange.xforce.ibmcloud.com/vulnerabilities/69975
https://bugzilla.novell.com/show_bug.cgi?id=637275
http://www.ubuntu.com/usn/USN-1504-1
http://www.securityfocus.com/bid/49724
http://www.openwall.com/lists/oss-security/2011/08/24/8
http://www.openwall.com/lists/oss-security/2011/08/22/6
http://security.gentoo.org/glsa/glsa-201206-02.xml
http://secunia.com/advisories/49895
http://secunia.com/advisories/49383
http://secunia.com/advisories/46410
http://secunia.com/advisories/46371
http://secunia.com/advisories/46187
http://secunia.com/advisories/46140
http://secunia.com/advisories/46128
http://rhn.redhat.com/errata/RHSA-2011-1328.html
http://rhn.redhat.com/errata/RHSA-2011-1323.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html