First published: Thu Oct 19 2023(Updated: )
Santesoft Sante FFT Imaging lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
<1.4.1 |
Santesoft has released an updated version of their product and recommends users update to Sante FFT Imaging to v1.4.1 https://santesoft.com/win/sante-fft-imaging/download.html .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the Santesoft Sante FFT Imaging vulnerability is CVE-2023-5059.
The severity of CVE-2023-5059 is high.
The vulnerability occurs due to the lack of proper validation of user-supplied data when parsing DICOM files in Santesoft Sante FFT Imaging.
The impact of CVE-2023-5059 is the potential execution of arbitrary code in the context of the current process.
To mitigate the vulnerability, users should update to version 1.4.2 or later of Santesoft Sante FFT Imaging.