ImageMagick is vulnerable to Denial of Service (DoS). It is due to an integer overflow flaw, leading to a heap-based buffer overflow in the ImageMagick routine responsible for creating X11 images. An attacker could create a specially-crafted image file that, when opened by a victim, would cause ImageMagick to crash or, potentially, execute arbitrary code.
imagemagick.org/script/changelog.php
lists.fedoraproject.org/pipermail/package-announce/2010-January/033766.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/033833.html
lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
mirror1.smudge-it.co.uk/imagemagick/www/changelog.html
osvdb.org/54729
secunia.com/advisories/35216
secunia.com/advisories/35382
secunia.com/advisories/35685
secunia.com/advisories/36260
secunia.com/advisories/37959
secunia.com/advisories/55721
security.gentoo.org/glsa/glsa-201311-10.xml
wiki.rpath.com/Advisories:rPSA-2010-0074
www.debian.org/security/2009/dsa-1858
www.openwall.com/lists/oss-security/2009/06/08/1
www.redhat.com/security/updates/classification/#moderate
www.securityfocus.com/archive/1/514516/100/0/threaded
www.securityfocus.com/bid/35111
www.vupen.com/english/advisories/2009/1449
access.redhat.com/errata/RHSA-2010:0653
usn.ubuntu.com/784-1/