Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.
When MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception.
Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.
When MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception.
Description: CWE-134 Use of Externally-Controlled Format String
Metrics
Version
Base score
Base severity
Vector
3.1
5.7
MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Version:3.1
Base score:5.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
The issue is resolved in Merge DICOM Toolkit 5.18.0 release.
Configurations
Workarounds
The vulnerability can be exploited by unauthenticated attackers with a privileged position in the network.
As a temporary solution, until a patch is released, it is highly recommended do not expose the vulnerable component inside an untrusted network.
Exploits
Credits
finder
Gabriele Quagliarella of Nozomi Networks found this bug during a security research activity.
Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.
When MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception.