During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.tenable.com/security/research/tra-2025-08 |
![]() ![]() ![]() |
History
Thu, 03 Apr 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Santesoft
Santesoft sante Pacs Server |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Santesoft
Santesoft sante Pacs Server |
Fri, 14 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 13 Mar 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker. | |
Title | Santesoft Sante PACS Server Stack-based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-03-14T13:41:49.600Z
Reserved: 2025-03-12T18:58:09.027Z
Link: CVE-2025-2263

Updated: 2025-03-14T13:41:38.244Z

Status : Analyzed
Published: 2025-03-13T17:15:38.617
Modified: 2025-04-03T18:20:38.627
Link: CVE-2025-2263

No data.