Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
https://support.apple.com/HT206167
http://www.securitytracker.com/id/1031444
http://www.securityfocus.com/bid/71820
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.openwall.com/lists/oss-security/2015/01/10/3
http://www.openwall.com/lists/oss-security/2015/01/10/1
http://www.openwall.com/lists/oss-security/2015/01/04/3
http://sourceforge.net/p/png-mng/mailman/message/33173461/
http://sourceforge.net/p/png-mng/mailman/message/33172831/
http://secunia.com/advisories/62725
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html