Cyber Posture

CVE-2025-0568

High

Published: 30 January 2025

Published
30 January 2025
Modified
19 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0167 82.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302.

Security Summary

CVE-2025-0568 is a memory corruption vulnerability affecting the DCM file parsing component in Sante PACS Server. The flaw stems from a lack of proper validation of user-supplied data during DCM file processing, which can trigger a denial-of-service condition on vulnerable installations. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and maps to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-787 (Out-of-bounds Write).

Remote attackers can exploit this vulnerability without authentication by sending a specially crafted DCM file to the server. Successful exploitation results in memory corruption, leading to a denial-of-service condition that disrupts system availability.

The Zero Day Initiative has published advisory ZDI-25-049, which provides further details on this issue, originally tracked as ZDI-CAN-25302. Security practitioners should consult this advisory for additional guidance on identification and mitigation.

Details

CWE(s)
CWE-119CWE-787

Affected Products

santesoft
sante pacs server
≤ 4.0.10

References