Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8979

Опубликовано: 15 фев. 2017
Источник: debian

Описание

Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dcmtkfixed3.6.1~20160216-2package

Примечания

  • 3.6.1~20160216-2 is the first version in unstable containing the fix

  • http://zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php

  • Fixed by: https://github.com/commontk/DCMTK/commit/1b6bb76

  • https://www.openwall.com/lists/oss-security/2016/12/17/2

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.

CVSS3: 7.5
nvd
почти 9 лет назад

Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.

CVSS3: 7.5
github
больше 3 лет назад

Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.