xmedcon 0.23.0 and fixed in v.0.24.0 is vulnerable to Buffer Overflow via libs/dicom/basic.c which allows an attacker to execute arbitrary code.
{
"binaries": [
{
"binary_name": "libmdc-dev",
"binary_version": "0.23.0-gtk3+dfsg-1.1build3"
},
{
"binary_name": "libmdc3t64",
"binary_version": "0.23.0-gtk3+dfsg-1.1build3"
},
{
"binary_name": "medcon",
"binary_version": "0.23.0-gtk3+dfsg-1.1build3"
},
{
"binary_name": "xmedcon",
"binary_version": "0.23.0-gtk3+dfsg-1.1build3"
}
]
}{
"binaries": [
{
"binary_name": "libmdc-dev",
"binary_version": "0.24.0-gtk3+dfsg-2"
},
{
"binary_name": "libmdc3t64",
"binary_version": "0.24.0-gtk3+dfsg-2"
},
{
"binary_name": "medcon",
"binary_version": "0.24.0-gtk3+dfsg-2"
},
{
"binary_name": "xmedcon",
"binary_version": "0.24.0-gtk3+dfsg-2"
}
]
}{
"binaries": [
{
"binary_name": "libmdc-dev",
"binary_version": "0.25.1-gtk3+dfsg-1"
},
{
"binary_name": "libmdc3t64",
"binary_version": "0.25.1-gtk3+dfsg-1"
},
{
"binary_name": "medcon",
"binary_version": "0.25.1-gtk3+dfsg-1"
},
{
"binary_name": "xmedcon",
"binary_version": "0.25.1-gtk3+dfsg-1"
}
]
}