Debian Dcmtk vulnerabilities

26 known vulnerabilities affecting debian/dcmtk.

Total CVEs
26
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH13MEDIUM11LOW2

Vulnerabilities

Page 2 of 2
CVE-2021-41689HIGHCVSS 7.5fixed in dcmtk 3.6.7-1 (bookworm)2021
CVE-2021-41689 [HIGH] CVE-2021-41689: dcmtk - DCMTK through 3.6.6 does not handle string copy properly. Sending specific reque... DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack. Scope: local bookworm: resolved (fixed in 3.6.7-1) bullseye: resolved (fixed in 3.6.5-1+deb11u1) for
debian
CVE-2021-41688HIGHCVSS 7.5fixed in dcmtk 3.6.7-1 (bookworm)2021
CVE-2021-41688 [HIGH] CVE-2021-41688: dcmtk - DCMTK through 3.6.6 does not handle memory free properly. The object in the prog... DCMTK through 3.6.6 does not handle memory free properly. The object in the program is free but its address is still used in other locations. Sending specific requests to the dcmqrdb program will incur a double free. An attacker can use it to launch a DoS attack. Scope: local bookworm: resolved (fixed in 3.6.7-1) bullseye: resolved (fixed in 3.6.5-1+deb11u1) forky: re
debian
CVE-2021-41690HIGHCVSS 7.5fixed in dcmtk 3.6.7-1 (bookworm)2021
CVE-2021-41690 [HIGH] CVE-2021-41690: dcmtk - DCMTK through 3.6.6 does not handle memory free properly. The malloced memory fo... DCMTK through 3.6.6 does not handle memory free properly. The malloced memory for storing all file information are recorded in a global variable LST and are not freed properly. Sending specific requests to the dcmqrdb program can incur a memory leak. An attacker can use it to launch a DoS attack. Scope: local bookworm: resolved (fixed in 3.6.7-1) bullseye: resolved (f
debian
CVE-2020-36855MEDIUMCVSS 4.8fixed in dcmtk 3.6.6-1 (bookworm)2020
CVE-2020-36855 [MEDIUM] CVE-2020-36855: dcmtk - A security vulnerability has been detected in DCMTK up to 3.6.5. The affected el... A security vulnerability has been detected in DCMTK up to 3.6.5. The affected element is the function parseQuota of the component dcmqrscp. The manipulation of the argument StorageQuota leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. Upgrading to version 3.6.6 is suffici
debian
CVE-2019-1010228LOWCVSS 9.8fixed in dcmtk 3.6.4-1 (bookworm)2019
CVE-2019-1010228 [CRITICAL] CVE-2019-1010228: dcmtk - OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: P... OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. DICOM to image conversion). The fixed version is: 3.6.4, after commit 40917614e. Sc
debian
CVE-2013-6825LOWCVSS 7.2fixed in dcmtk 3.6.1~20150629-1 (bookworm)2013
CVE-2013-6825 [HIGH] CVE-2013-6825: dcmtk - (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4... (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by creating a
debian