Offis

Dcmtk

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 28.06.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 06:26:38

DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to l...

  • EPSS 0.1%
  • Veröffentlicht 28.06.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 06:26:38

DCMTK through 3.6.6 does not handle memory free properly. The object in the program is free but its address is still used in other locations. Sending specific requests to the dcmqrdb program will incur a double free. An attacker can use it to launch ...

  • EPSS 0.13%
  • Veröffentlicht 28.06.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 06:26:37

DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to...

  • EPSS 0.06%
  • Veröffentlicht 24.06.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:21

OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.

  • EPSS 2.94%
  • Veröffentlicht 24.06.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:21

OFFIS DCMTK's (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.

  • EPSS 2.94%
  • Veröffentlicht 24.06.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:21

OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 22.07.2019 17:15:38
  • Zuletzt bearbeitet 21.11.2024 04:18:04

OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 10.06.2014 14:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and ear...