7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.8%
Gjoko Krstic discovered that DCMTK incorrectly handled buffers. If a user or
an automated system were tricked into opening a certain specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8979)
Omar Ganiev discovered that DCMTK incorrectly handled buffers. If a user or
an automated system were tricked into opening a certain specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-1010228)
Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a
user or an automated system were tricked into opening a certain specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2021-41687,
CVE-2021-41688, CVE-2021-41689, and CVE-2021-41690)
Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled
certain inputs. If a user or an automated system were tricked into opening
a certain specially crafted input file, a remote attacker could possibly use
this issue to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-2119 and CVE-2022-2120)
Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled
pointers. If a user or an automated system were tricked into opening a
certain specially crafted input file, a remote attacker could possibly use
this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-2121)
It was discovered that DCMTK incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a certain specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. This issue affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-43272)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.10 | noarch | libdcmtk17 | < 3.6.7-6ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | dcmtk | < 3.6.7-6ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | dcmtk-dbgsym | < 3.6.7-6ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | dcmtk-doc | < 3.6.7-6ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | libdcmtk-dev | < 3.6.7-6ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | libdcmtk17-dbgsym | < 3.6.7-6ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | dcmtk | < 3.6.6-5ubuntu0.1~esm1 | UNKNOWN |
Ubuntu | 22.04 | noarch | dcmtk | < 3.6.6-5 | UNKNOWN |
Ubuntu | 22.04 | noarch | dcmtk-dbgsym | < 3.6.6-5 | UNKNOWN |
Ubuntu | 22.04 | noarch | dcmtk-doc | < 3.6.6-5 | UNKNOWN |
ubuntu.com/security/CVE-2015-8979
ubuntu.com/security/CVE-2019-1010228
ubuntu.com/security/CVE-2021-41687
ubuntu.com/security/CVE-2021-41688
ubuntu.com/security/CVE-2021-41689
ubuntu.com/security/CVE-2021-41690
ubuntu.com/security/CVE-2022-2119
ubuntu.com/security/CVE-2022-2120
ubuntu.com/security/CVE-2022-2121
ubuntu.com/security/CVE-2022-43272
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.8%