CVE-2021-41689

DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://github.com/DCMTK/dcmtk - Product, Third Party Advisory () https://github.com/DCMTK/dcmtk - Product, Third Party Advisory
References () https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d - Patch, Third Party Advisory () https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html -

28 Jun 2024, 19:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html -

Information

Published : 2022-06-28 13:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41689

Mitre link : CVE-2021-41689

CVE.ORG link : CVE-2021-41689


JSON object : View

Products Affected

offis

  • dcmtk
CWE
CWE-476

NULL Pointer Dereference