UBUNTU-CVE-2020-36855

Source
https://ubuntu.com/security/CVE-2020-36855
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36855.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2020-36855
Upstream
Published
2025-10-21T15:15:00Z
Modified
2026-04-16T09:48:08.762613Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 1.9 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A security vulnerability has been detected in DCMTK up to 3.6.5. The affected element is the function parseQuota of the component dcmqrscp. The manipulation of the argument StorageQuota leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. Upgrading to version 3.6.6 is sufficient to fix this issue. The identifier of the patch is 0fef9f02e. It is recommended to upgrade the affected component.

References

Affected packages

Ubuntu:Pro:16.04:LTS / dcmtk

Package

Name
dcmtk
Purl
pkg:deb/ubuntu/dcmtk@3.6.1~20150924-5ubuntu0.1~esm3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.6.0-15.1
3.6.1~20150629-5
3.6.1~20150924-4
3.6.1~20150924-5
3.6.1~20150924-5ubuntu0.1~esm1
3.6.1~20150924-5ubuntu0.1~esm2
3.6.1~20150924-5ubuntu0.1~esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.6.1~20150924-5ubuntu0.1~esm3",
            "binary_name": "dcmtk"
        },
        {
            "binary_version": "3.6.1~20150924-5ubuntu0.1~esm3",
            "binary_name": "libdcmtk-dev"
        },
        {
            "binary_version": "3.6.1~20150924-5ubuntu0.1~esm3",
            "binary_name": "libdcmtk5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36855.json"

Ubuntu:Pro:18.04:LTS / dcmtk

Package

Name
dcmtk
Purl
pkg:deb/ubuntu/dcmtk@3.6.2-3ubuntu0.1~esm3?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.6.2-2
3.6.2-2build1
3.6.2-3
3.6.2-3build1
3.6.2-3build2
3.6.2-3build3
3.6.2-3ubuntu0.1~esm1
3.6.2-3ubuntu0.1~esm2
3.6.2-3ubuntu0.1~esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.6.2-3ubuntu0.1~esm3",
            "binary_name": "dcmtk"
        },
        {
            "binary_version": "3.6.2-3ubuntu0.1~esm3",
            "binary_name": "libdcmtk-dev"
        },
        {
            "binary_version": "3.6.2-3ubuntu0.1~esm3",
            "binary_name": "libdcmtk12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36855.json"

Ubuntu:Pro:20.04:LTS / dcmtk

Package

Name
dcmtk
Purl
pkg:deb/ubuntu/dcmtk@3.6.4-2.1ubuntu0.2+esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.6.4-2.1
3.6.4-2.1build1
3.6.4-2.1build2
3.6.4-2.1ubuntu0.1~esm1
3.6.4-2.1ubuntu0.1
3.6.4-2.1ubuntu0.1+esm1
3.6.4-2.1ubuntu0.2
3.6.4-2.1ubuntu0.2+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.6.4-2.1ubuntu0.2+esm1",
            "binary_name": "dcmtk"
        },
        {
            "binary_version": "3.6.4-2.1ubuntu0.2+esm1",
            "binary_name": "libdcmtk-dev"
        },
        {
            "binary_version": "3.6.4-2.1ubuntu0.2+esm1",
            "binary_name": "libdcmtk14"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36855.json"