First published: Mon Dec 19 2016(Updated: )
At several places in the code a wrong length of ACSE data structures received over the network can cause overflows or underflows when processing those data structures. Related checks have been added at various places in order to prevent such (possible) attacks. The bug will affect all DCMTK-based server applications that accept incoming DICOM network connections. According to the reports only <= 3.6.0 versions are affected. References: <a href="http://seclists.org/oss-sec/2016/q4/700">http://seclists.org/oss-sec/2016/q4/700</a> <a href="http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php">http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php</a> Upstream patch: <a href="https://github.com/commontk/DCMTK/commit/1b6bb76">https://github.com/commontk/DCMTK/commit/1b6bb76</a>
Affected Software | Affected Version | How to fix |
---|---|---|
DCMTK | <=3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1405919 is classified as high due to the potential for exploitation through data overflows or underflows.
To fix REDHAT-BUG-1405919, update your Offis DCMTK to a version higher than 3.6.0 where the vulnerability is addressed.
Offis DCMTK versions up to and including 3.6.0 are affected by REDHAT-BUG-1405919.
REDHAT-BUG-1405919 is a vulnerability related to buffer overflow and underflow caused by incorrect handling of ACSE data structures.
Exploitation attempts leveraging REDHAT-BUG-1405919 could potentially occur, but specific known exploits are not publicly documented.