Vulnerability Description
DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to launch a DoS attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Offis | Dcmtk | <= 3.6.6 |
Related Weaknesses (CWE)
References
- https://github.com/DCMTK/dcmtkProductThird Party Advisory
- https://github.com/DCMTK/dcmtk/commit/a9697dfeb672b0b9412c00c7d36d801e27ec85cbPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html
- https://github.com/DCMTK/dcmtkProductThird Party Advisory
- https://github.com/DCMTK/dcmtk/commit/a9697dfeb672b0b9412c00c7d36d801e27ec85cbPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00032.html
FAQ
What is CVE-2021-41687?
CVE-2021-41687 is a vulnerability with a CVSS score of 7.5 (HIGH). DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb progra...
How severe is CVE-2021-41687?
CVE-2021-41687 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41687?
Check the references section above for vendor advisories and patch information. Affected products include: Offis Dcmtk.