DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to launch a DoS attack.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3847-1 dcmtk security update
Debian DLA Debian DLA DLA-4038-1 dcmtk security update
EUVD EUVD EUVD-2021-28699 DCMTK through 3.6.6 does not handle memory free properly. The program malloc a heap memory for parsing data, but does not free it when error in parsing. Sending specific requests to the dcmqrdb program incur the memory leak. An attacker can use it to launch a DoS attack.
Ubuntu USN Ubuntu USN USN-5882-1 DCMTK vulnerabilities
Ubuntu USN Ubuntu USN USN-7010-1 DCMTK vulnerabilities
Ubuntu USN Ubuntu USN USN-7010-2 DCMTK regression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00129}

epss

{'score': 0.00135}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T03:15:29.277Z

Reserved: 2021-09-27T00:00:00

Link: CVE-2021-41687

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-28T13:15:10.213

Modified: 2024-11-21T06:26:37.953

Link: CVE-2021-41687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.