CVE-2021-41689

DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
References
Link Resource
https://github.com/DCMTK/dcmtk Product Third Party Advisory
https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*

Information

Published : 2022-06-28 06:15

Updated : 2022-07-06 12:44


NVD link : CVE-2021-41689

Mitre link : CVE-2021-41689


JSON object : View

CWE
CWE-476

NULL Pointer Dereference

Advertisement

dedicated server usa

Products Affected

offis

  • dcmtk