An out-of-bounds write vulnerability exists in the Grassroots DICOM library (GDCM). The issue is triggered during parsing of a malformed DICOM file containing encapsulated PixelData fragments (compressed image data stored as multiple fragments). This vulnerability leads to a segmentation fault caused by an out-of-bounds memory access due to unsigned integer underflow in buffer indexing. It is exploitable via file input, simply opening a crafted malicious DICOM file is sufficient to trigger the crash, resulting in a denial-of-service condition.
[
{
"digest": {
"length": 3699.0,
"function_hash": "14508277489847140881181178753801618218"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-11266-43ad6b8e",
"target": {
"function": "ReadValue",
"file": "Source/DataStructureAndEncodingDefinition/gdcmSequenceOfFragments.h"
},
"source": "https://github.com/malaterre/gdcm/commit/5829c95c8ac3afa9a3a3413675e948959c28a789"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"3584130573601150422239773274888427963",
"129083064797078902253931115651571964786",
"181374703737913879988987868105724939906",
"217182343023067882888346861882490080915"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-11266-abfd1296",
"target": {
"file": "Source/DataStructureAndEncodingDefinition/gdcmSequenceOfFragments.h"
},
"source": "https://github.com/malaterre/gdcm/commit/5829c95c8ac3afa9a3a3413675e948959c28a789"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-11266.json"