Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-53619

Опубликовано: 16 дек. 2025
Источник: debian
EPSS Низкий

Описание

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gdcmunfixedpackage
gdcmno-dsatrixiepackage
gdcmno-dsabookwormpackage
gdcmpostponedbullseyepackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2210

EPSS

Процентиль: 13%
0.00043
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 2 месяцев назад

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data

CVSS3: 7.4
nvd
около 2 месяцев назад

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data

CVSS3: 7.4
github
около 2 месяцев назад

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data

EPSS

Процентиль: 13%
0.00043
Низкий