We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-2263

Santesoft Sante PACS Server Stack-based Buffer Overflow



Description

During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.

Reserved 2025-03-12 | Published 2025-03-13 | Updated 2025-03-14 | Assigner tenable


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

Default status
unaffected

4.1.0
affected

4.2.0
unaffected

References

www.tenable.com/security/research/tra-2025-08

cve.org (CVE-2025-2263)

nvd.nist.gov (CVE-2025-2263)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-2263

Support options

Helpdesk Chat, Email, Knowledgebase