First published: Thu Jan 30 2025(Updated: )
Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sante PACS Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0568 is classified as a high severity vulnerability due to its potential to cause a denial-of-service attack.
To mitigate CVE-2025-0568, it is recommended to update Sante PACS Server to the latest version where the vulnerability has been patched.
CVE-2025-0568 can be exploited by any remote attacker, as authentication is not required.
The primary consequence of CVE-2025-0568 is that it can lead to a denial-of-service condition, affecting the availability of Sante PACS Server.
CVE-2025-0568 specifically affects Sante PACS Server installations.