Do you mind explaining what makes you think that images are containers for executable code and that your box is executing them?
If that's happening due to a buffer overrun error on your device or something similar, isn't that a problem of your box having unpatched code?
Normally images are not executable.
Even if someone inserted executable code into image data, there is no reason that data would ever be on an execution path within the running code.
Unless there's a defect in your system.
If you disagree with my assessment, kindly explain with COPIOUS DETAIL what makes you think that is the case.