CVE-2024-27628

NameCVE-2024-27628
DescriptionBuffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1074483

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dcmtk (PTS)bullseye3.6.5-1fixed
bookworm3.6.7-9~deb12u1vulnerable
sid, trixie3.6.8-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dcmtksourcebuster(not affected)
dcmtksourcebullseye(not affected)
dcmtksource(unstable)3.6.8-61074483

Notes

[bookworm] - dcmtk <no-dsa> (Minor issue)
[bullseye] - dcmtk <not-affected> (Vulnerable code introduced later)
[buster] - dcmtk <not-affected> (Vulnerable code introduced later)
https://support.dcmtk.org/redmine/issues/1108
https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3
Introduced by: https://github.com/DCMTK/dcmtk/commit/d45c34c076d45b4b04d72f5edd19fb13fad6c1a0 (DCMTK-3.6.5+_20191213)

Search for package or bug name: Reporting problems