CVE-2024-29421

6.2 MEDIUM

📋 TL;DR

This vulnerability in xmedcon allows attackers to execute arbitrary code via a buffer overflow in the DICOM parsing component. It affects users of xmedcon 0.23.0 and earlier versions who process untrusted DICOM files. The vulnerability could lead to complete system compromise.

💻 Affected Systems

Products:
  • xmedcon
Versions: 0.23.0 and earlier
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when processing DICOM files through the vulnerable library component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Application crash (denial of service) or limited code execution within the application context.

🟢

If Mitigated

Application crash with no code execution if memory protections are enabled.

🌐 Internet-Facing: MEDIUM - Requires processing of malicious DICOM files, which could be uploaded to web interfaces or processed via network services.
🏢 Internal Only: MEDIUM - Internal users could exploit via malicious DICOM files in medical imaging workflows.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious DICOM file and getting it processed by the vulnerable application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.24.0

Vendor Advisory: https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md

Restart Required: Yes

Instructions:

1. Download xmedcon 0.24.0 or later from official sources. 2. Uninstall vulnerable version. 3. Install patched version. 4. Restart any services using xmedcon.

🔧 Temporary Workarounds

Restrict DICOM file processing

all

Limit processing of DICOM files to trusted sources only

Disable vulnerable component

linux

Disable DICOM support if not required

Recompile xmedcon with DICOM support disabled

🧯 If You Can't Patch

  • Implement strict input validation for DICOM files
  • Run xmedcon in a sandboxed/containerized environment with limited privileges

🔍 How to Verify

Check if Vulnerable:

Check xmedcon version: xmedcon --version | grep '0.23.0' or earlier

Check Version:

xmedcon --version

Verify Fix Applied:

Verify version is 0.24.0 or later: xmedcon --version | grep -E '0.24.0|0.25.0|0.26.0'

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Unusual memory access patterns in system logs

Network Indicators:

  • Unexpected DICOM file transfers to vulnerable systems

SIEM Query:

process_name:"xmedcon" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export