During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
References
| Link | Resource |
|---|---|
| https://www.tenable.com/security/research/tra-2025-08 | Exploit Third Party Advisory |
| https://www.tenable.com/security/research/tra-2025-08 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-03-13 17:15
Updated : 2025-04-03 18:20
NVD link : CVE-2025-2263
Mitre link : CVE-2025-2263
CVE.ORG link : CVE-2025-2263
JSON object : View
Products Affected
santesoft
- sante_pacs_server
