Описание
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
dcmtk | fixed | 3.6.8-6 | package | |
dcmtk | fixed | 3.6.7-9~deb12u2 | bookworm | package |
dcmtk | not-affected | bullseye | package | |
dcmtk | not-affected | buster | package |
Примечания
https://support.dcmtk.org/redmine/issues/1108
https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3
Introduced by: https://github.com/DCMTK/dcmtk/commit/d45c34c076d45b4b04d72f5edd19fb13fad6c1a0 (DCMTK-3.6.5+_20191213)
EPSS
Связанные уязвимости
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Уязвимость метода EctEnhancedCT библиотеки для работы с форматом DICOM DCMTK, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS