CVE-2025-2263

During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
References
Link Resource
https://www.tenable.com/security/research/tra-2025-08 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2025-08 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*

History

03 Apr 2025, 18:20

Type Values Removed Values Added
CPE cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*
CWE CWE-787
First Time Santesoft
Santesoft sante Pacs Server
References () https://www.tenable.com/security/research/tra-2025-08 - () https://www.tenable.com/security/research/tra-2025-08 - Exploit, Third Party Advisory

14 Mar 2025, 14:15

Type Values Removed Values Added
Summary
  • (es) Al iniciar sesión en el servidor web en "Sante PACS Server.exe", se llama a la función OpenSSL EVP_DecryptUpdate para descifrar el nombre de usuario y la contraseña. Se pasa a la función un búfer fijo de pila de 0x80 bytes como búfer de salida. Se produce un desbordamiento de búfer de pila si un atacante remoto no autenticado proporciona un nombre de usuario o una contraseña cifrados largos.
References () https://www.tenable.com/security/research/tra-2025-08 - () https://www.tenable.com/security/research/tra-2025-08 -

13 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-13 17:15

Updated : 2025-04-03 18:20


NVD link : CVE-2025-2263

Mitre link : CVE-2025-2263

CVE.ORG link : CVE-2025-2263


JSON object : View

Products Affected

santesoft

  • sante_pacs_server
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write