{"id":"CVE-2019-1010228","details":"OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. DICOM to image conversion). The fixed version is: 3.6.4, after commit 40917614e.","modified":"2026-03-13T22:29:33.848732Z","published":"2019-07-22T17:15:38.793Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQOAULR72EYJQ4HS6YGLK2S6YNEXY2ET/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBKP2O24CTYIANEJTP4TVEPYEVSYV2RX/"},{"type":"EVIDENCE","url":"https://support.dcmtk.org/redmine/issues/858"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dcmtk/dcmtk","events":[{"introduced":"0"},{"last_affected":"1f20e10ca48ebcbf4cb3e9fd1aae4ce6eaee0609"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.6.3"}]}}],"versions":["CAR96-3.0.1","CAR96-3.0.2","DCMTK-3.1.0","DCMTK-3.1.1","DCMTK-3.1.2","DCMTK-3.2.0","DCMTK-3.2.1","DCMTK-3.3.0","DCMTK-3.3.1","DCMTK-3.4.0","DCMTK-3.4.1","DCMTK-3.4.2","DCMTK-3.5.0","DCMTK-3.5.1","DCMTK-3.5.2","DCMTK-3.5.2a","DCMTK-3.5.3","DCMTK-3.5.4","DCMTK-3.6.0","DCMTK-3.6.1_20110225","DCMTK-3.6.1_20110519","DCMTK-3.6.1_20110707","DCMTK-3.6.1_20110922","DCMTK-3.6.1_20111208","DCMTK-3.6.1_20120222","DCMTK-3.6.1_20120515","DCMTK-3.6.1_20120831","DCMTK-3.6.1_20121102","DCMTK-3.6.1_20131114","DCMTK-3.6.1_20140617","DCMTK-3.6.1_20150217","DCMTK-3.6.1_20150629","DCMTK-3.6.1_20150924","DCMTK-3.6.1_20160216","DCMTK-3.6.1_20160630","DCMTK-3.6.1_20161102","DCMTK-3.6.1_20170228","DCMTK-3.6.2","DCMTK-3.6.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1010228.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}