Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
https://bugzilla.redhat.com/show_bug.cgi?id=952158
http://www.securityfocus.com/bid/59609
http://www.debian.org/security/2013/dsa-2698
http://secunia.com/advisories/53765
http://secunia.com/advisories/53237
http://seclists.org/oss-sec/2013/q2/254
http://rhn.redhat.com/errata/RHSA-2014-0223.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105828.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105253.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104916.html