Get a Pentest and security assessment of your IT network.

Advisories

DevIL DICOM GetUID() Buffer Overflow

Secunia Research has discovered a vulnerability in DevIL, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused by a boundary error within the “GetUID()” function in src-IL/src/il_dicom.c. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted DICOM file in an application using the library. The vulnerability is confirmed in version 1.7.8. Other versions may also be affected.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83471/secunia-dicom.txt

Source: https://packetstormsecurity.com/files/83471/DevIL-DICOM-GetUID-Buffer-Overflow.html

Related posts
Advisories

57657.html

Advisories

Secunia Security Advisory 17317

Advisories

Ubuntu Security Notice 284-1

Advisories

Hardened-PHP Project Security Advisory 2006-14.139