CVE-2021-41689
Published: 28 June 2022
DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
Priority
Status
Package | Release | Status |
---|---|---|
dcmtk Launchpad, Ubuntu, Debian |
impish |
Ignored
(end of life)
|
trusty |
Does not exist
|
|
upstream |
Released
(3.6.7-1)
|
|
xenial |
Released
(3.6.1~20150924-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
kinetic |
Not vulnerable
(3.6.7-5)
|
|
bionic |
Released
(3.6.2-3ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
focal |
Released
(3.6.4-2.1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
jammy |
Released
(3.6.6-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
lunar |
Not vulnerable
(3.6.7-5)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41689
- https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d (DCMTK-3.6.7)
- https://github.com/DCMTK/dcmtk
- https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d
- https://ubuntu.com/security/notices/USN-5882-1
- NVD
- Launchpad
- Debian