CVE-2021-41689

DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
References
Link Resource
https://github.com/DCMTK/dcmtk Product Third Party Advisory
https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d Patch Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*

Information

Published : 2022-06-28 01:15

Updated : 2022-07-06 07:44


NVD link : CVE-2021-41689

Mitre link : CVE-2021-41689

Products Affected
No products.
CWE