Integer overflow in the ImageRegionReader::ReadIntoBuffer function in MediaStorageAndFileFormat/gdcmImageRegionReader.cxx in Grassroots DICOM (aka GDCM) before 2.6.2 allows attackers to execute arbitrary code via crafted header dimensions in a DICOM image file, which triggers a buffer overflow.
{
"binaries": [
{
"binary_name": "libgdcm-cil",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libgdcm-java",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libgdcm-tools",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libgdcm2.2",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libvtkgdcm-cil",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libvtkgdcm-java",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libvtkgdcm-tools",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "libvtkgdcm2.2",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "php5-gdcm",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "php5-vtkgdcm",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "python-gdcm",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
},
{
"binary_name": "python-vtkgdcm",
"binary_version": "2.2.4-1.1ubuntu4+esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}