CVE-2025-2263

During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
References
Link Resource
https://www.tenable.com/security/research/tra-2025-08 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2025-08 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*

History

03 Apr 2025, 18:20

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2025-08 - () https://www.tenable.com/security/research/tra-2025-08 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-787
CPE cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*
First Time Santesoft sante Pacs Server
Santesoft

13 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-13 17:15

Updated : 2025-04-03 18:20


NVD link : CVE-2025-2263

Mitre link : CVE-2025-2263


JSON object : View

Products Affected

santesoft

  • sante_pacs_server
CWE
CWE-787

Out-of-bounds Write