Offis

Dcmtk

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.18%
  • Veröffentlicht 24.06.2022 15:15:10
  • Zuletzt bearbeitet 03.11.2025 20:15:53

OFFIS DCMTK's (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.

  • EPSS 5.18%
  • Veröffentlicht 24.06.2022 15:15:10
  • Zuletzt bearbeitet 03.11.2025 20:15:53

OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.

Exploit
  • EPSS 0.24%
  • Veröffentlicht 22.07.2019 17:15:38
  • Zuletzt bearbeitet 21.11.2024 04:18:04

OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 10.06.2014 14:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and ear...