CVE-2021-41689

DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
References
Link Resource
https://github.com/DCMTK/dcmtk Product Third Party Advisory
https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*

History

06 Jul 2022, 19:44

Type Values Removed Values Added
CPE cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-476
References (MISC) https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d - (MISC) https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d - Patch, Third Party Advisory
References (MISC) https://github.com/DCMTK/dcmtk - (MISC) https://github.com/DCMTK/dcmtk - Product, Third Party Advisory
First Time Offis dcmtk
Offis

28 Jun 2022, 13:50

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-28 13:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-41689

Mitre link : CVE-2021-41689

CVE.ORG link : CVE-2021-41689


JSON object : View

Products Affected

offis

  • dcmtk
CWE
CWE-476

NULL Pointer Dereference