Heap-based buffer overflow in the libMagick component of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function.
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
bugs.debian.org/cgi-bin/bugreport.cgi?bug=345595
secunia.com/advisories/21719
secunia.com/advisories/24186
secunia.com/advisories/24284
www.debian.org/security/2006/dsa-1168
www.redhat.com/support/errata/RHSA-2007-0015.html
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9481