imagemagick is vulnerable to arbitrary code execution. The vulnerability exists as a heap-based buffer overflow flaw was found in ImageMagickβs processing of certain malformed PCX images. If a victim opened a specially-crafted PCX file, an attacker could possibly execute arbitrary code on the victimβs machine.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=413034
lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
osvdb.org/43213
secunia.com/advisories/29786
secunia.com/advisories/29857
secunia.com/advisories/30967
secunia.com/advisories/36260
secunia.com/advisories/55721
security.gentoo.org/glsa/glsa-201311-10.xml
www.debian.org/security/2009/dsa-1858
www.mandriva.com/security/advisories?name=MDVSA-2008:099
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2008-0145.html
www.redhat.com/support/errata/RHSA-2008-0165.html
www.securityfocus.com/bid/28822
www.securitytracker.com/id?1019881
access.redhat.com/errata/RHSA-2008:0145
bugzilla.redhat.com/show_bug.cgi?id=285861
exchange.xforce.ibmcloud.com/vulnerabilities/41193
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11237