CVE-2022-4981

A vulnerability was detected in DCMTK up to 3.6.7. The impacted element is the function DcmQueryRetrieveConfig::readPeerList of the file /dcmqrcnf.cc of the component dcmqrscp. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit is now public and may be used. Upgrading to version 3.6.8 is sufficient to resolve this issue. The patch is identified as 957fb31e5. Upgrading the affected component is advised.
References
Link Resource
https://shimo.im/docs/e1Azd4dDQXUgOGqW/ Exploit Third Party Advisory
https://support.dcmtk.org/redmine/issues/1026 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.329029 Permissions Required VDB Entry
https://vuldb.com/?id.329029 Third Party Advisory VDB Entry
https://vuldb.com/?submit.673134 Third Party Advisory VDB Entry
https://shimo.im/docs/e1Azd4dDQXUgOGqW/read Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-10-21 15:15

Updated : 2025-10-31 14:55


NVD link : CVE-2022-4981

Mitre link : CVE-2022-4981

CVE.ORG link : CVE-2022-4981


JSON object : View

Products Affected

offis

  • dcmtk
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference