Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Tue, 21 Oct 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was detected in DCMTK up to 3.6.7. The impacted element is the function DcmQueryRetrieveConfig::readPeerList of the file /dcmqrcnf.cc of the component dcmqrscp. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit is now public and may be used. Upgrading to version 3.6.8 is sufficient to resolve this issue. The patch is identified as 957fb31e5. Upgrading the affected component is advised. | |
Title | DCMTK dcmqrscp dcmqrcnf.cc readPeerList null pointer dereference | |
Weaknesses | CWE-404 CWE-476 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-21T15:22:40.779Z
Reserved: 2025-10-19T10:26:26.206Z
Link: CVE-2022-4981

Updated: 2025-10-21T15:22:29.808Z

Status : Awaiting Analysis
Published: 2025-10-21T15:15:37.550
Modified: 2025-10-21T19:31:25.450
Link: CVE-2022-4981

No data.

No data.