Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of URLs in the web server module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25318.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-055/ | Third Party Advisory |
Configurations
History
19 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Santesoft
Santesoft sante Pacs Server |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-787 | |
CPE | cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:* | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-055/ - Third Party Advisory |
30 Jan 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-30 21:15
Updated : 2025-02-19 19:15
NVD link : CVE-2025-0574
Mitre link : CVE-2025-0574
CVE.ORG link : CVE-2025-0574
JSON object : View
Products Affected
santesoft
- sante_pacs_server