Metrics
Affected Vendors & Products
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dicom
Dicom dcmtk |
|
| Vendors & Products |
Dicom
Dicom dcmtk |
Tue, 21 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Tue, 21 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in DCMTK up to 3.6.5. The affected element is the function parseQuota of the component dcmqrscp. The manipulation of the argument StorageQuota leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. Upgrading to version 3.6.6 is sufficient to fix this issue. The identifier of the patch is 0fef9f02e. It is recommended to upgrade the affected component. | |
| Title | DCMTK dcmqrscp parseQuota stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-10-21T15:02:09.082Z
Updated: 2025-10-21T15:23:26.003Z
Reserved: 2025-10-19T10:27:07.409Z
Link: CVE-2020-36855
Updated: 2025-10-21T15:23:15.793Z
Status : Awaiting Analysis
Published: 2025-10-21T15:15:36.750
Modified: 2025-10-21T19:31:25.450
Link: CVE-2020-36855
No data.