First published: Wed Feb 22 2023(Updated: )
Gjoko Krstic discovered that DCMTK incorrectly handled buffers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8979) Omar Ganiev discovered that DCMTK incorrectly handled buffers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010228) Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2021-41687, CVE-2021-41688, CVE-2021-41689, and CVE-2021-41690) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-2119 and CVE-2022-2120) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-2121) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-43272)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libdcmtk17 | <3.6.7-6ubuntu0.1 | 3.6.7-6ubuntu0.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/dcmtk | <3.6.7-6ubuntu0.1 | 3.6.7-6ubuntu0.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/dcmtk | <3.6.6-5ubuntu0.1~esm1 | 3.6.6-5ubuntu0.1~esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libdcmtk16 | <3.6.6-5ubuntu0.1~esm1 | 3.6.6-5ubuntu0.1~esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libdcmtk14 | <3.6.4-2.1ubuntu0.1~esm1 | 3.6.4-2.1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/dcmtk | <3.6.4-2.1ubuntu0.1~esm1 | 3.6.4-2.1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/dcmtk | <3.6.2-3ubuntu0.1~esm1 | 3.6.2-3ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libdcmtk12 | <3.6.2-3ubuntu0.1~esm1 | 3.6.2-3ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libdcmtk5 | <3.6.1~20150924-5ubuntu0.1~esm1 | 3.6.1~20150924-5ubuntu0.1~esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/dcmtk | <3.6.1~20150924-5ubuntu0.1~esm1 | 3.6.1~20150924-5ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-5882-1 is categorized as potentially critical due to the possibility of a denial of service caused by malicious crafted input.
To fix USN-5882-1, you should update the affected packages to their recommended versions as specified in the Ubuntu security announcement.
USN-5882-1 primarily affects Ubuntu 16.04 LTS and also has implications for several other versions including Ubuntu 18.04, 20.04, and 22.04.
The impacted packages by USN-5882-1 include dcmtk and libdcmtk for various versions of Ubuntu.
Yes, USN-5882-1 presents a risk of remote exploitation that could lead to a denial of service if a user is tricked into opening a crafted file.