A buffer overflow in DCMTK git master v3.6.9+ DEV allows attackers to cause a Denial of Service (DoS) via a crafted DCM file.
References
| Link | Resource |
|---|---|
| https://git.dcmtk.org/?p=dcmtk.git;a=commit;h=410ffe2019b9db6a8f4036daac742a6f5e4d36c2 | Patch |
| https://lists.debian.org/debian-lts-announce/2025/06/msg00025.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-18 23:15
Updated : 2025-11-04 20:31
NVD link : CVE-2025-25472
Mitre link : CVE-2025-25472
CVE.ORG link : CVE-2025-25472
JSON object : View
Products Affected
debian
- debian_linux
offis
- dcmtk
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
