Name | CVE-2024-27628 |
Description | Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1074483 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
dcmtk (PTS) | bullseye | 3.6.5-1 | fixed |
| bookworm | 3.6.7-9~deb12u1 | vulnerable |
| sid, trixie | 3.6.8-6 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
dcmtk | source | buster | (not affected) | | | |
dcmtk | source | bullseye | (not affected) | | | |
dcmtk | source | (unstable) | 3.6.8-6 | | | 1074483 |
Notes
[bookworm] - dcmtk <no-dsa> (Minor issue)
[bullseye] - dcmtk <not-affected> (Vulnerable code introduced later)
[buster] - dcmtk <not-affected> (Vulnerable code introduced later)
https://support.dcmtk.org/redmine/issues/1108
https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3
Introduced by: https://github.com/DCMTK/dcmtk/commit/d45c34c076d45b4b04d72f5edd19fb13fad6c1a0 (DCMTK-3.6.5+_20191213)