First published: Tue Jun 28 2022(Updated: )
DCMTK through 3.6.6 does not handle memory free properly. The object in the program is free but its address is still used in other locations. Sending specific requests to the dcmqrdb program will incur a double free. An attacker can use it to launch a DoS attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/dcmtk | <=3.6.5-1 | 3.6.7-9~deb12u1 3.6.8-6 |
DCMTK | <=3.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41688 is classified as a high severity vulnerability due to its potential for causing a denial of service (DoS) attack.
To fix CVE-2021-41688, upgrade to the patched versions dcmtk 3.6.7-9~deb12u1 or dcmtk 3.6.8-6.
CVE-2021-41688 affects DCMTK versions up to 3.6.6 and specific Debian packages below version 3.6.7.
CVE-2021-41688 can facilitate a denial of service (DoS) attack by allowing attackers to exploit memory handling issues.
Exploiting CVE-2021-41688 can lead to application crashes and service interruptions for users relying on the affected DCMTK software.