CVE-2024-28877
CVE-2024-28877: Stack-based buffer overflow vulnerability in MicroDicom DICOM Viewer allows for potential arbitrary code execution. Exploitation requires user interaction.
MicroDicom DICOM Viewer is susceptible to stack-based buffer overflow (CVE-2024-28877) where a specially crafted file could enable attackers to execute arbitrary code within the application's context. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) of 30 indicates a low-risk level, suggesting limited active exploitation or impact. The vulnerability stems from improper handling of input data, potentially leading to a buffer overflow during processing, as detailed in CWE-121. Successful exploitation requires user interaction, meaning an attacker must trick a user into opening a malicious file. Mitigation should still be considered as the software is tagged "In The Wild".
Description
CVE-2024-28877 is a stack-based buffer overflow vulnerability in MicroDicom DICOM Viewer. This vulnerability allows an attacker to execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit this vulnerability. The CVSS score for this vulnerability is 8.8, indicating a high severity level. However, the SOCRadar Vulnerability Risk Score (SVRS) for this vulnerability is 46, indicating a moderate risk level. This difference in scoring is due to the fact that the SVRS takes into account additional factors, such as social media activity, news reports, and code repository data, which indicate that this vulnerability is not currently being actively exploited.
Key Insights
- This vulnerability is a stack-based buffer overflow, which is a type of memory corruption vulnerability that can allow an attacker to execute arbitrary code on the affected system.
- This vulnerability is rated as high severity by CVSS, but moderate risk by SVRS, indicating that it is not currently being actively exploited.
- User interaction is required to exploit this vulnerability, which means that an attacker must trick a user into opening a malicious file or visiting a malicious website.
Mitigation Strategies
- Update to the latest version of MicroDicom DICOM Viewer.
- Disable unnecessary features and services.
- Use a firewall to block unauthorized access to the affected system.
- Implement intrusion detection and prevention systems to detect and block attacks.
Additional Information
- There are no known threat actors or APT groups that are actively exploiting this vulnerability.
- There are no active exploits that have been published for this vulnerability.
- CISA has not issued a warning for this vulnerability.
- This vulnerability is not currently being used in the wild.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.