First published: Fri Jun 28 2024(Updated: )
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DCMTK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27628 is a Buffer Overflow vulnerability in DCMTK v.3.6.8 that allows an attacker to execute arbitrary code.
The severity of CVE-2024-27628 is considered high due to the potential for executing arbitrary code.
To fix CVE-2024-27628, upgrade to the latest version of DCMTK that addresses this buffer overflow vulnerability.
DCMTK versions prior to the patched release following the discovery of CVE-2024-27628 are affected.
CVE-2024-27628 can compromise application security by allowing attackers to execute malicious code on vulnerable systems.