7.5
CVSSv3

CVE-2015-8979

Published: 15/02/2017 Updated: 23/02/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

dicom dcmtk

Vendor Advisories

Debian Bug report logs - #848830 dcmtk: remote stack buffer overflow CVE-2015-8979 Package: dcmtk; Maintainer for dcmtk is Debian Med Packaging Team <debian-med-packaging@listsaliothdebianorg>; Source for dcmtk is src:dcmtk (PTS, buildd, popcon) Reported by: Balint Reczey <balint@balintreczeyhu> Date: Tue, 20 Dec ...
Gjoko Krstic of Zero Science Labs discovered that dcmtk, a collection of libraries implementing the DICOM standard, did not properly handle the size of data received from the network This could lead to denial-of-service (via application crash) or arbitrary code execution For the stable distribution (jessie), this problem has been fixed in version ...