1 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242. Desbordamiento de búfer basado en pila en la función parsePresentationContext en storescp en DICOM dcmtk-3.6.0 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de una cadena larga enviada al puerto TCP 4242. • http://packetstormsecurity.com/files/140191/DCMTK-storescp-DICOM-storage-C-STORE-SCP-Remote-Stack-Buffer-Overflow.html http://www.debian.org/security/2016/dsa-3749 http://www.openwall.com/lists/oss-security/2016/12/18/2 http://www.securityfocus.com/bid/94951 http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php https://bugzilla.redhat.com/show_bug.cgi?id=1405919 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •