CVE-2024-27628

Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:offis:dcmtk:3.6.8:*:*:*:*:*:*:*

History

11 Jun 2025, 15:22

Type Values Removed Values Added
First Time Offis
Offis dcmtk
CPE cpe:2.3:a:offis:dcmtk:3.6.8:*:*:*:*:*:*:*
References () https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3 - () https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3 - Patch
References () https://support.dcmtk.org/redmine/issues/1108 - () https://support.dcmtk.org/redmine/issues/1108 - Exploit, Vendor Advisory

Information

Published : 2024-06-28 19:15

Updated : 2025-06-11 15:22


NVD link : CVE-2024-27628

Mitre link : CVE-2024-27628

CVE.ORG link : CVE-2024-27628


JSON object : View

Products Affected

offis

  • dcmtk
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')