Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
[
{
"source": "https://github.com/dcmtk/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
"target": {
"file": "dcmect/tests/tests.cc"
},
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-27628-3157ef5d",
"signature_version": "v1",
"digest": {
"line_hashes": [
"204700470389280200807070841246740560503",
"61202981732753408858422620467311607272"
],
"threshold": 0.9
}
},
{
"source": "https://github.com/dcmtk/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
"target": {
"file": "dcmect/libsrc/enhanced_ct.cc"
},
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-27628-dce4861d",
"signature_version": "v1",
"digest": {
"line_hashes": [
"185380026879053939524332020298672580385",
"319115726796059695131724448623036982611",
"218581835887973571169760439157103449128",
"108125108876862493611763158797933895949",
"192239228801806753500367927955071657401",
"67729835086113099357512206467235773494",
"333809219029954011657732484272337019455",
"320999237033759826666582391997327085988",
"247745217991472886132457691633041388633",
"85386152398415621989247972389834465738"
],
"threshold": 0.9
}
}
]