CVE-2021-41688
Published: 28 June 2022
DCMTK through 3.6.6 does not handle memory free properly. The object in the program is free but its address is still used in other locations. Sending specific requests to the dcmqrdb program will incur a double free. An attacker can use it to launch a DoS attack.
Priority
Status
Package | Release | Status |
---|---|---|
dcmtk Launchpad, Ubuntu, Debian |
impish |
Ignored
(end of life)
|
trusty |
Does not exist
|
|
upstream |
Released
(3.6.7-1)
|
|
xenial |
Released
(3.6.1~20150924-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
kinetic |
Not vulnerable
(3.6.7-5)
|
|
bionic |
Released
(3.6.2-3ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
focal |
Released
(3.6.4-2.1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
jammy |
Released
(3.6.6-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
lunar |
Not vulnerable
(3.6.7-5)
|
|
mantic |
Not vulnerable
(3.6.7-5)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41688
- https://github.com/DCMTK/dcmtk/commit/a9697dfeb672b0b9412c00c7d36d801e27ec85cb (DCMTK-3.6.7)
- https://github.com/DCMTK/dcmtk
- https://github.com/DCMTK/dcmtk/commit/a9697dfeb672b0b9412c00c7d36d801e27ec85cb
- https://ubuntu.com/security/notices/USN-5882-1
- NVD
- Launchpad
- Debian