Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-052/ |
![]() ![]() |
History
Wed, 19 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Santesoft
Santesoft sante Pacs Server |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Santesoft
Santesoft sante Pacs Server |
|
Metrics |
cvssV3_1
|
Mon, 10 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 30 Jan 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303. | |
Title | Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability | |
Weaknesses | CWE-119 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-02-10T22:08:31.384Z
Reserved: 2025-01-19T03:31:47.335Z
Link: CVE-2025-0569

Updated: 2025-01-31T16:36:27.457Z

Status : Analyzed
Published: 2025-01-30T21:15:13.710
Modified: 2025-02-19T19:27:58.173
Link: CVE-2025-0569

No data.