During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2025-08 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2025-08 | Exploit Third Party Advisory |
Configurations
History
03 Apr 2025, 18:20
Type | Values Removed | Values Added |
---|---|---|
First Time |
Santesoft
Santesoft sante Pacs Server |
|
CPE | cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
References | () https://www.tenable.com/security/research/tra-2025-08 - Exploit, Third Party Advisory |
14 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.tenable.com/security/research/tra-2025-08 - |
13 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-13 17:15
Updated : 2025-04-03 18:20
NVD link : CVE-2025-2263
Mitre link : CVE-2025-2263
CVE.ORG link : CVE-2025-2263
JSON object : View
Products Affected
santesoft
- sante_pacs_server