{"id":"CVE-2021-41689","details":"DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.","modified":"2026-04-16T00:10:01.187680934Z","published":"2022-06-28T13:15:10.587Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00032.html"},{"type":"ADVISORY","url":"https://github.com/DCMTK/dcmtk"},{"type":"ADVISORY","url":"https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d"},{"type":"FIX","url":"https://github.com/DCMTK/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d"},{"type":"PACKAGE","url":"https://github.com/DCMTK/dcmtk"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dcmtk/dcmtk","events":[{"introduced":"0"},{"fixed":"5c14bf53fb42ceca12bbcc0016e8704b1580920d"}]}],"versions":["CAR96-3.0.1","CAR96-3.0.2","DCMTK-3.1.0","DCMTK-3.1.1","DCMTK-3.1.2","DCMTK-3.2.0","DCMTK-3.2.1","DCMTK-3.3.0","DCMTK-3.3.1","DCMTK-3.4.0","DCMTK-3.4.1","DCMTK-3.4.2","DCMTK-3.5.0","DCMTK-3.5.1","DCMTK-3.5.2","DCMTK-3.5.2a","DCMTK-3.5.3","DCMTK-3.5.4","DCMTK-3.6.0","DCMTK-3.6.1_20110225","DCMTK-3.6.1_20110519","DCMTK-3.6.1_20110707","DCMTK-3.6.1_20110922","DCMTK-3.6.1_20111208","DCMTK-3.6.1_20120222","DCMTK-3.6.1_20120515","DCMTK-3.6.1_20120831","DCMTK-3.6.1_20121102","DCMTK-3.6.1_20131114","DCMTK-3.6.1_20140617","DCMTK-3.6.1_20150217","DCMTK-3.6.1_20150629","DCMTK-3.6.1_20150924","DCMTK-3.6.1_20160216","DCMTK-3.6.1_20160630","DCMTK-3.6.1_20161102","DCMTK-3.6.1_20170228","DCMTK-3.6.2","DCMTK-3.6.3","DCMTK-3.6.4","DCMTK-3.6.5","DCMTK-3.6.5+_20191213","DCMTK-3.6.6"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"file":"dcmnet/libsrc/diutil.cc","function":"DU_getStringDOElement"},"signature_type":"Function","signature_version":"v1","source":"https://github.com/dcmtk/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d","digest":{"length":439,"function_hash":"80136285118307407980788561937282351991"},"id":"CVE-2021-41689-71369e06"},{"deprecated":false,"digest":{"line_hashes":["271725108542103721447172720779576056066","316500101137357808368170813884001274287","305284922305329055125628489147487985880","104193795071144907342856644040731570808"],"threshold":0.9},"signature_type":"Line","signature_version":"v1","source":"https://github.com/dcmtk/dcmtk/commit/5c14bf53fb42ceca12bbcc0016e8704b1580920d","target":{"file":"dcmnet/libsrc/diutil.cc"},"id":"CVE-2021-41689-d8b7fc02"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41689.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}