Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.
The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-050/ |
![]() ![]() |
History
Wed, 19 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Santesoft
Santesoft sante Pacs Server |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Santesoft
Santesoft sante Pacs Server |
|
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 30 Jan 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304. | |
Title | Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability | |
Weaknesses | CWE-119 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-01-31T18:58:02.814Z
Reserved: 2025-01-19T03:31:51.826Z
Link: CVE-2025-0570

Updated: 2025-01-31T18:57:58.116Z

Status : Analyzed
Published: 2025-01-30T21:15:13.830
Modified: 2025-02-19T19:27:03.770
Link: CVE-2025-0570

No data.