CVE-2013-6825Dcmtk vulnerability

CWE-2647 documents6 sources
Severity
7.2HIGHNVD
EPSS
0.1%
top 70.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 10
Latest updateSep 26

Description

(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by creating a large number of processes.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages3 packages

debiandebian/dcmtk< dcmtk 3.6.1~20150629-1 (bookworm)
Debianoffis/dcmtk< 3.6.1~20150629-1+3
NVDoffis/dcmtk3.6.1+6

🔴Vulnerability Details

2
GHSA
GHSA-9xf4-22r3-7ccc: (1) movescu2022-05-14
OSV
CVE-2013-6825: (1) movescu2014-06-10

📋Vendor Advisories

1
Debian
CVE-2013-6825: dcmtk - (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4...2013

📄Research Papers

1
arXiv
Timeloops: Automatic System Call Policy Learning for Containerized Microservices2022-09-26

💬Community

2
Bugzilla
CVE-2013-6825 dcmtk: possible privilege escalation if setuid() fails [fedora-all]2014-06-03
Bugzilla
CVE-2013-6825 dcmtk: possible privilege escalation if setuid() fails2014-06-03
CVE-2013-6825 — Debian Dcmtk vulnerability | cvebase