CVE-2025-11266
Unknown Unknown - Not Provided
Out-of-Bounds Write in GDCM DICOM Parser Causes DoS

Publication date: 2025-12-12

Last updated on: 2025-12-12

Assigner: ICS-CERT

Description
An out-of-bounds write vulnerability exists in the Grassroots DICOM library (GDCM). The issue is triggered during parsing of a malformed DICOM file containing encapsulated PixelData fragments (compressed image data stored as multiple fragments). This vulnerability leads to a segmentation fault caused by an out-of-bounds memory access due to unsigned integer underflow in buffer indexing. It is exploitable via file input, simply opening a crafted malicious DICOM file is sufficient to trigger the crash, resulting in a denial-of-service condition.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-12
Last Modified
2025-12-12
Generated
2026-05-06
AI Q&A
2025-12-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
grassroots_dicom gdcm *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds write in the Grassroots DICOM library (GDCM) that occurs when parsing a malformed DICOM file containing encapsulated PixelData fragments. It happens due to an unsigned integer underflow in buffer indexing, leading to a segmentation fault caused by out-of-bounds memory access. Simply opening a crafted malicious DICOM file can trigger this issue.


How can this vulnerability impact me? :

The vulnerability can cause a denial-of-service condition by crashing the application when a malicious DICOM file is opened. This crash results from a segmentation fault due to out-of-bounds memory access, potentially disrupting services that rely on the Grassroots DICOM library.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is triggered by opening a crafted malicious DICOM file containing malformed encapsulated PixelData fragments. Detection involves identifying such malicious DICOM files before processing. You can scan files for suspicious or malformed DICOM PixelData fragments. However, no specific detection commands or network detection methods are provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the Grassroots DICOM library (GDCM) to a fixed version that addresses this vulnerability. The release v3.2.2 of GDCM is available and likely contains the fix. Avoid opening untrusted or suspicious DICOM files until the update is applied. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart