{"id":"CVE-2022-2121","details":"OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.","modified":"2026-04-16T00:01:13.067081982Z","published":"2022-06-24T15:15:10.800Z","related":["openSUSE-SU-2023:0108-1","openSUSE-SU-2024:12925-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00032.html"},{"type":"ADVISORY","url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dcmtk/dcmtk","events":[{"introduced":"0"},{"fixed":"a137f1aff4e1df3fbefe53ee8b160973c74c96dd"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"3.6.7"}],"cpe":"cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*"}}],"versions":["CAR96-3.0.1","CAR96-3.0.2","DCMTK-3.1.0","DCMTK-3.1.1","DCMTK-3.1.2","DCMTK-3.2.0","DCMTK-3.2.1","DCMTK-3.3.0","DCMTK-3.3.1","DCMTK-3.4.0","DCMTK-3.4.1","DCMTK-3.4.2","DCMTK-3.5.0","DCMTK-3.5.1","DCMTK-3.5.2","DCMTK-3.5.2a","DCMTK-3.5.3","DCMTK-3.5.4","DCMTK-3.6.0","DCMTK-3.6.1_20110225","DCMTK-3.6.1_20110519","DCMTK-3.6.1_20110707","DCMTK-3.6.1_20110922","DCMTK-3.6.1_20111208","DCMTK-3.6.1_20120222","DCMTK-3.6.1_20120515","DCMTK-3.6.1_20120831","DCMTK-3.6.1_20121102","DCMTK-3.6.1_20131114","DCMTK-3.6.1_20140617","DCMTK-3.6.1_20150217","DCMTK-3.6.1_20150629","DCMTK-3.6.1_20150924","DCMTK-3.6.1_20160216","DCMTK-3.6.1_20160630","DCMTK-3.6.1_20161102","DCMTK-3.6.1_20170228","DCMTK-3.6.2","DCMTK-3.6.3","DCMTK-3.6.4","DCMTK-3.6.5","DCMTK-3.6.5+_20191213","DCMTK-3.6.6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2121.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}