Description
Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.

When MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception.
Published: 2024-05-03
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The issue is resolved in Merge DICOM Toolkit 5.18.0 release.


Vendor Workaround

The vulnerability can be exploited by unauthenticated attackers with a privileged position in the network. As a temporary solution, until a patch is released, it is highly recommended do not expose the vulnerable component inside an untrusted network.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-21344 Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows. When MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2024-08-01T23:13:08.679Z

Reserved: 2024-01-23T15:02:55.722Z

Link: CVE-2024-23914

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:08.679Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-03T09:15:08.090

Modified: 2024-11-21T08:58:42.020

Link: CVE-2024-23914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses