This exploit demonstrates a remote stack buffer overflow in DCMTK's storescp DICOM storage SCP by sending a maliciously crafted A-ASSOCIATE PDU with an oversized buffer. The vulnerability allows remote code execution by overflowing the parsePresentationContext function.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:DCMTK storescp <= 3.6.0
No auth needed
Prerequisites:Network access to the target's DICOM storage SCP service