CVE-2021-41689
https://notcve.org/view.php?id=CVE-2021-41689
DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack. DCMTK versiones hasta 3.6.6 no maneja apropiadamente la copia de cadenas. Al enviar peticiones específicas al programa dcmqrdb, éste consulta su base de datos y copia el resultado incluso si éste es nulo, lo que puede incurrir en un desbordamiento en la región head de la memoria. • https://github.com/DCMTK/dcmtk https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html • CWE-476: NULL Pointer Dereference •
CVE-2022-2119 – OFFIS DCMTK Path Traversal
https://notcve.org/view.php?id=CVE-2022-2119
OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution. El proveedor de clase de servicio (SCP) de OFFIS DCMTK (todas las versiones anteriores a 3.6.7) es vulnerable a una exploración de rutas, lo que permite a un atacante escribir archivos DICOM en directorios arbitrarios bajo nombres controlados. Esto podría permitir una ejecución remota de código • https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-2121 – OFFIS DCMTK NULL Pointer Dereference
https://notcve.org/view.php?id=CVE-2022-2121
OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition. OFFIS DCMTK"s (Todas las versiones anteriores a 3.6.7) presenta una vulnerabilidad de desreferencia de puntero NULL mientras procesa archivos DICOM, que puede resultar en una condición de denegación de servicio • https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01 • CWE-476: NULL Pointer Dereference •
CVE-2022-2120 – OFFIS DCMTK Path Traversal
https://notcve.org/view.php?id=CVE-2022-2120
OFFIS DCMTK's (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution. El usuario de clase de servicio (SCU) de OFFIS DCMTK (todas las versiones anteriores a 3.6.7) es vulnerable a un salto de ruta relativo, lo que permite a un atacante escribir archivos DICOM en directorios arbitrarios bajo nombres controlados. Esto podría permitir una ejecución remota de código • https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •
CVE-2019-1010228
https://notcve.org/view.php?id=CVE-2019-1010228
OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. DICOM to image conversion). • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQOAULR72EYJQ4HS6YGLK2S6YNEXY2ET https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBKP2O24CTYIANEJTP4TVEPYEVSYV2RX https://support.dcmtk.org/redmine/issues/858 • CWE-787: Out-of-bounds Write •