The JPEGLSCodec::DecodeExtent function in MediaStorageAndFileFormat/gdcmJPEGLSCodec.cxx in Grassroots DICOM (aka GDCM) before 2.6.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (application crash) via an embedded JPEG-LS image with dimensions larger than the selected region in a (1) two-dimensional or (2) three-dimensional DICOM image file, which triggers an out-of-bounds read.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/135206/GDCM-2.6.0-2.6.1-Out-Of-Bounds-Read.html | Third Party Advisory VDB Entry |
http://census-labs.com/news/2016/01/11/gdcm-out-bounds-read-jpeglscodec-decodeextent/ | Exploit Third Party Advisory |
http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/ | Patch Third Party Advisory |
http://sourceforge.net/p/gdcm/mailman/message/34687533/ | Exploit Third Party Advisory |
http://sourceforge.net/p/gdcm/mailman/message/34670701/ | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2016/Jan/33 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/537263/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2016-01-12 12:59
Updated : 2021-01-21 09:30
NVD link : CVE-2015-8397
Mitre link : CVE-2015-8397
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
grassroots_dicom_project
- grassroots_dicom