Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Tue, 21 Oct 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security vulnerability has been detected in DCMTK up to 3.6.5. The affected element is the function parseQuota of the component dcmqrscp. The manipulation of the argument StorageQuota leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. Upgrading to version 3.6.6 is sufficient to fix this issue. The identifier of the patch is 0fef9f02e. It is recommended to upgrade the affected component. | |
Title | DCMTK dcmqrscp parseQuota stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-21T15:23:26.003Z
Reserved: 2025-10-19T10:27:07.409Z
Link: CVE-2020-36855

Updated: 2025-10-21T15:23:15.793Z

Status : Awaiting Analysis
Published: 2025-10-21T15:15:36.750
Modified: 2025-10-21T19:31:25.450
Link: CVE-2020-36855

No data.

No data.