First published: Tue Jun 28 2022(Updated: )
DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to launch a DoS attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/dcmtk | <=3.6.5-1 | 3.6.7-9~deb12u1 3.6.8-6 |
DCMTK | <=3.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41687 has been classified as a medium severity vulnerability due to the memory leak that can lead to a denial-of-service attack.
To mitigate CVE-2021-41687, upgrade DCMTK to version 3.6.7-9~deb12u1 or 3.6.8-6 to address the memory leak issue.
CVE-2021-41687 affects DCMTK versions up to and including 3.6.6.
An attacker can exploit CVE-2021-41687 to launch a denial-of-service (DoS) attack by causing a memory leak.
CVE-2021-41687 was last updated on September 17, 2021.