CVE-2024-52333

8.4 HIGH

📋 TL;DR

An improper array index validation vulnerability in OFFIS DCMTK's determineMinMax function allows out-of-bounds writes when processing specially crafted DICOM files. This could lead to arbitrary code execution or application crashes. Systems using DCMTK for medical imaging processing are affected.

💻 Affected Systems

Products:
  • OFFIS DCMTK
Versions: 3.6.8 and earlier
Operating Systems: All platforms running DCMTK
Default Config Vulnerable: ⚠️ Yes
Notes: Any system using DCMTK libraries or applications to process DICOM files is vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash causing denial of service for medical imaging workflows, potentially disrupting patient care.

🟢

If Mitigated

Contained application crash with no lateral movement if proper network segmentation and least privilege are implemented.

🌐 Internet-Facing: MEDIUM - Requires attacker to upload malicious DICOM file to vulnerable system, but many medical systems have limited internet exposure.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could exploit this to move laterally within healthcare networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious DICOM file and getting it processed by vulnerable DCMTK. No authentication bypass needed for file processing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 03e851b0586d05057c3268988e180ffb426b2e03

Vendor Advisory: https://git.dcmtk.org/?p=dcmtk.git;a=commit;h=03e851b0586d05057c3268988e180ffb426b2e03

Restart Required: No

Instructions:

1. Update DCMTK to version with commit 03e851b0586d05057c3268988e180ffb426b2e03 or later. 2. Recompile any applications using DCMTK libraries. 3. Test with sample DICOM files to ensure functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict validation of DICOM files before processing with DCMTK

🧯 If You Can't Patch

  • Implement network segmentation to isolate DCMTK systems from untrusted networks
  • Deploy application allowlisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check DCMTK version: dcmdump --version or examine installed package version

Check Version:

dcmdump --version 2>&1 | grep Version

Verify Fix Applied:

Verify DCMTK version includes commit 03e851b0586d05057c3268988e180ffb426b2e03

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in DCMTK processes
  • Unusual DICOM file processing errors
  • Memory access violation logs

Network Indicators:

  • Unusual DICOM file uploads to medical imaging systems
  • Outbound connections from DCMTK processes

SIEM Query:

source="dcmtk" AND (event_type="crash" OR error="segmentation fault" OR error="access violation")

🔗 References

📤 Share & Export