Upstream information

CVE-2024-27628 at MITRE

Description

Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
  CNA (CISA-ADP)
Base Score 8.1
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1227235 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP6
  • dcmtk >= 3.6.9-bp156.4.3.1
  • dcmtk-devel >= 3.6.9-bp156.4.3.1
  • libdcmtk19 >= 3.6.9-bp156.4.3.1
Patchnames:
openSUSE-2025-53
openSUSE Leap 15.6
  • dcmtk >= 3.6.9-bp156.4.3.1
  • dcmtk-devel >= 3.6.9-bp156.4.3.1
  • libdcmtk19 >= 3.6.9-bp156.4.3.1
Patchnames:
openSUSE-2025-53
openSUSE Tumbleweed
  • dcmtk >= 3.6.8-5.1
  • dcmtk-devel >= 3.6.8-5.1
  • libdcmtk18 >= 3.6.8-5.1
Patchnames:
openSUSE-Tumbleweed-2024-14514


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 22:01:11 2024
CVE page last modified: Thu Jun 12 18:08:40 2025