CVE-2013-6825
Publication date 10 June 2014
Last updated 24 July 2024
Ubuntu priority
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by creating a large number of processes.
Status
Package | Ubuntu Release | Status |
---|---|---|
dcmtk | 24.10 oracular |
Vulnerable
|
24.04 LTS noble |
Vulnerable
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
Patch details
Package | Patch details |
---|---|
dcmtk |
References
Other references
- http://hmarco.org/bugs/dcmtk-3.6.1-privilege-escalation.html
- http://secunia.com/advisories/58916
- http://seclists.org/fulldisclosure/2014/Jun/11
- http://packetstormsecurity.com/files/126883/DCMTK-Privilege-Escalation.html
- http://git.dcmtk.org/web?p=dcmtk.git;a=blob;f=CHANGES.361
- https://www.cve.org/CVERecord?id=CVE-2013-6825