{"id":"CVE-2024-34509","details":"dcmdata in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message.","modified":"2026-05-01T20:02:28.061999Z","published":"2024-05-05T00:00:00Z","related":["openSUSE-SU-2024:14514-1","openSUSE-SU-2025:0053-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/34xxx/CVE-2024-34509.json","cna_assigner":"mitre"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00032.html"},{"type":"WEB","url":"https://support.dcmtk.org/redmine/issues/1114"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/34xxx/CVE-2024-34509.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34509"},{"type":"FIX","url":"https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dcmtk/dcmtk","events":[{"introduced":"0"},{"fixed":"ac002900cab167509881e5b837cdef5dcb07cd37"},{"fixed":"c78e434c0c5f9d932874f0b17a8b4ce305ca01f5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.6.9"}]}}],"versions":["CAR96-3.0.1","CAR96-3.0.2","DCMTK-3.1.0","DCMTK-3.1.1","DCMTK-3.1.2","DCMTK-3.2.0","DCMTK-3.2.1","DCMTK-3.3.0","DCMTK-3.3.1","DCMTK-3.4.0","DCMTK-3.4.1","DCMTK-3.4.2","DCMTK-3.5.0","DCMTK-3.5.1","DCMTK-3.5.2","DCMTK-3.5.2a","DCMTK-3.5.3","DCMTK-3.5.4","DCMTK-3.6.0","DCMTK-3.6.1_20110225","DCMTK-3.6.1_20110519","DCMTK-3.6.1_20110707","DCMTK-3.6.1_20110922","DCMTK-3.6.1_20111208","DCMTK-3.6.1_20120222","DCMTK-3.6.1_20120515","DCMTK-3.6.1_20120831","DCMTK-3.6.1_20121102","DCMTK-3.6.1_20131114","DCMTK-3.6.1_20140617","DCMTK-3.6.1_20150217","DCMTK-3.6.1_20150629","DCMTK-3.6.1_20150924","DCMTK-3.6.1_20160216","DCMTK-3.6.1_20160630","DCMTK-3.6.1_20161102","DCMTK-3.6.1_20170228","DCMTK-3.6.2","DCMTK-3.6.3","DCMTK-3.6.4","DCMTK-3.6.5","DCMTK-3.6.5+_20191213","DCMTK-3.6.6","DCMTK-3.6.7","DCMTK-3.6.8"],"database_specific":{"vanir_signatures_modified":"2026-05-01T20:02:28Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-34509.json","vanir_signatures":[{"target":{"file":"dcmdata/libsrc/dcelem.cc"},"deprecated":false,"id":"CVE-2024-34509-259192c1","source":"https://github.com/dcmtk/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5","signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["321289557262096896171952352877768762595","291725335082269747295471959533461576026","186632231549782204741828082419186109506","21916427638379185643192987879110154150","104971792859652200123134372523023455082"],"threshold":0.9}},{"target":{"file":"dcmnet/libsrc/dimcmd.cc"},"deprecated":false,"id":"CVE-2024-34509-2e147200","source":"https://github.com/dcmtk/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5","signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["299326527344649242998932142778440711719","49067310252150725088956330077825588555","270274032958405853331266005279620414630","202036066171719322418400530286856960119","59375726671739860258038960532592604997","200674161434863873289527192244502240339","152278687928604605100033118782707187643","321307452200580816728876895275417856372","167599706266460849262000820179101275288","279257506079384743003966540167338309516","99671043450185511295364584945495109201"],"threshold":0.9}},{"target":{"file":"dcmdata/libsrc/dcelem.cc","function":"DcmElement::loadValue"},"deprecated":false,"id":"CVE-2024-34509-302ee811","source":"https://github.com/dcmtk/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5","signature_version":"v1","signature_type":"Function","digest":{"length":1017,"function_hash":"70370729332710322857318875167960280129"}},{"target":{"file":"dcmnet/libsrc/dimcmd.cc","function":"getString"},"deprecated":false,"id":"CVE-2024-34509-9e25025e","source":"https://github.com/dcmtk/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5","signature_version":"v1","signature_type":"Function","digest":{"length":760,"function_hash":"321023368012238278128880959096665392428"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}