CVE-2021-41687
Published: 28 June 2022
DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to launch a DoS attack.
Priority
Status
Package | Release | Status |
---|---|---|
dcmtk Launchpad, Ubuntu, Debian |
bionic |
Released
(3.6.2-3ubuntu0.1~esm1)
Available with Ubuntu Pro |
focal |
Released
(3.6.4-2.1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
impish |
Ignored
(end of life)
|
|
jammy |
Released
(3.6.6-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
lunar |
Not vulnerable
(3.6.7-5)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.6.7-1)
|
|
xenial |
Released
(3.6.1~20150924-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
kinetic |
Not vulnerable
(3.6.7-5)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41687
- https://github.com/DCMTK/dcmtk/commit/a9697dfeb672b0b9412c00c7d36d801e27ec85cb (DCMTK-3.6.7)
- https://github.com/DCMTK/dcmtk
- https://github.com/DCMTK/dcmtk/commit/a9697dfeb672b0b9412c00c7d36d801e27ec85cb
- https://ubuntu.com/security/notices/USN-5882-1
- NVD
- Launchpad
- Debian