CVE-2024-27628

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27628
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27628.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27628
Downstream
Related
Published
2024-06-28T19:15:05Z
Modified
2025-10-21T19:49:05.353037Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.

References

Affected packages

Git / github.com/dcmtk/dcmtk

Affected ranges

Type
GIT
Repo
https://github.com/dcmtk/dcmtk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

CAR96-3.*

CAR96-3.0.1
CAR96-3.0.2

DCMTK-3.*

DCMTK-3.1.0
DCMTK-3.1.1
DCMTK-3.1.2
DCMTK-3.2.0
DCMTK-3.2.1
DCMTK-3.3.0
DCMTK-3.3.1
DCMTK-3.4.0
DCMTK-3.4.1
DCMTK-3.4.2
DCMTK-3.5.0
DCMTK-3.5.1
DCMTK-3.5.2
DCMTK-3.5.2a
DCMTK-3.5.3
DCMTK-3.5.4
DCMTK-3.6.0
DCMTK-3.6.1_20110225
DCMTK-3.6.1_20110519
DCMTK-3.6.1_20110707
DCMTK-3.6.1_20110922
DCMTK-3.6.1_20111208
DCMTK-3.6.1_20120222
DCMTK-3.6.1_20120515
DCMTK-3.6.1_20120831
DCMTK-3.6.1_20121102
DCMTK-3.6.1_20131114
DCMTK-3.6.1_20140617
DCMTK-3.6.1_20150217
DCMTK-3.6.1_20150629
DCMTK-3.6.1_20150924
DCMTK-3.6.1_20160216
DCMTK-3.6.1_20160630
DCMTK-3.6.1_20161102
DCMTK-3.6.1_20170228
DCMTK-3.6.2
DCMTK-3.6.3
DCMTK-3.6.4
DCMTK-3.6.5
DCMTK-3.6.5+_20191213
DCMTK-3.6.6
DCMTK-3.6.7
DCMTK-3.6.8

Database specific

vanir_signatures

[
    {
        "source": "https://github.com/dcmtk/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
        "target": {
            "file": "dcmect/tests/tests.cc"
        },
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2024-27628-3157ef5d",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "204700470389280200807070841246740560503",
                "61202981732753408858422620467311607272"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/dcmtk/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
        "target": {
            "file": "dcmect/libsrc/enhanced_ct.cc"
        },
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2024-27628-dce4861d",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "185380026879053939524332020298672580385",
                "319115726796059695131724448623036982611",
                "218581835887973571169760439157103449128",
                "108125108876862493611763158797933895949",
                "192239228801806753500367927955071657401",
                "67729835086113099357512206467235773494",
                "333809219029954011657732484272337019455",
                "320999237033759826666582391997327085988",
                "247745217991472886132457691633041388633",
                "85386152398415621989247972389834465738"
            ],
            "threshold": 0.9
        }
    }
]