CVE-2024-34509
📋 TL;DR
CVE-2024-34509 is a segmentation fault vulnerability in dcmdata component of DCMTK medical imaging toolkit. It allows denial of service attacks via specially crafted invalid DIMSE messages. Systems running DCMTK for medical image processing and communication are affected.
💻 Affected Systems
- DCMTK (DICOM Toolkit)
📦 What is this software?
Dcmtk by Offis
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of medical imaging systems, potentially affecting patient care workflows and diagnostic capabilities.
Likely Case
Application crash requiring manual restart, causing temporary service interruption in medical imaging workflows.
If Mitigated
Minimal impact with proper network segmentation and input validation in place.
🎯 Exploit Status
Exploitation requires sending malformed DIMSE messages over network to vulnerable DCMTK instances.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.9 and later
Vendor Advisory: https://support.dcmtk.org/redmine/issues/1114
Restart Required: Yes
Instructions:
1. Download DCMTK 3.6.9 or later from official repository. 2. Compile and install following build instructions. 3. Restart all DCMTK-dependent services.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict DICOM/DIMSE traffic to trusted medical imaging networks only.
iptables -A INPUT -p tcp --dport 104 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 104 -j DROP
Input Validation Proxy
allDeploy a proxy that validates DIMSE messages before forwarding to DCMTK.
🧯 If You Can't Patch
- Implement strict network access controls to limit DIMSE traffic to authorized sources only.
- Monitor for application crashes and implement automated restart mechanisms for critical services.
🔍 How to Verify
Check if Vulnerable:
Check DCMTK version: dcmdump --version | grep 'OFFIS DCMTK'
Check Version:
dcmdump --version
Verify Fix Applied:
Verify version is 3.6.9 or later and test with valid DICOM communication.
📡 Detection & Monitoring
Log Indicators:
- Segmentation fault errors in DCMTK logs
- Unexpected application termination
- Core dumps from dcmtk processes
Network Indicators:
- Malformed DIMSE messages on port 104/tcp
- Unusual DICOM communication patterns
SIEM Query:
source="dcmtk.log" AND ("segmentation fault" OR "SIGSEGV" OR "core dumped")
🔗 References
- https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html
- https://support.dcmtk.org/redmine/issues/1114
- https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00032.html
- https://support.dcmtk.org/redmine/issues/1114