Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of URLs in the web server module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25318.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-055/ | Third Party Advisory |
Configurations
History
19 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-055/ - Third Party Advisory | |
CWE | CWE-787 | |
Summary |
|
|
CPE | cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:* | |
First Time |
Santesoft sante Pacs Server
Santesoft |
30 Jan 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-30 21:15
Updated : 2025-02-19 19:15
NVD link : CVE-2025-0574
Mitre link : CVE-2025-0574
CVE.ORG link : CVE-2025-0574
JSON object : View
Products Affected
santesoft
- sante_pacs_server