CVE-2021-41687
- EPSS 0.18%
- Veröffentlicht 28.06.2022 13:15:10
- Zuletzt bearbeitet 03.11.2025 21:15:42
DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to...
CVE-2022-2121
- EPSS 0.07%
- Veröffentlicht 24.06.2022 15:15:10
- Zuletzt bearbeitet 03.11.2025 21:15:51
OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.
CVE-2022-2120
- EPSS 5.68%
- Veröffentlicht 24.06.2022 15:15:10
- Zuletzt bearbeitet 03.11.2025 20:15:53
OFFIS DCMTK's (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
CVE-2022-2119
- EPSS 5.68%
- Veröffentlicht 24.06.2022 15:15:10
- Zuletzt bearbeitet 03.11.2025 20:15:53
OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
CVE-2019-1010228
- EPSS 0.59%
- Veröffentlicht 22.07.2019 17:15:38
- Zuletzt bearbeitet 21.11.2024 04:18:04
OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of...
CVE-2013-6825
- EPSS 0.11%
- Veröffentlicht 10.06.2014 14:55:09
- Zuletzt bearbeitet 06.05.2026 22:30:45
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and ear...