First published: Tue Jun 28 2022(Updated: )
DCMTK through 3.6.6 does not handle memory free properly. The malloced memory for storing all file information are recorded in a global variable LST and are not freed properly. Sending specific requests to the dcmqrdb program can incur a memory leak. An attacker can use it to launch a DoS attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/dcmtk | <=3.6.5-1 | 3.6.7-9~deb12u1 3.6.8-6 |
DCMTK | <=3.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41690 is classified as a medium severity vulnerability due to its potential to cause a denial of service via memory leak.
To fix CVE-2021-41690, upgrade to DCMTK version 3.6.7 or later.
CVE-2021-41690 can be exploited to launch denial of service attacks by causing memory leaks.
CVE-2021-41690 affects OFFIS DCMTK versions up to 3.6.6.
There is no official workaround documented for CVE-2021-41690 other than upgrading to a patched version.