During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-6300 During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00866}

epss

{'score': 0.01272}


Thu, 03 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Santesoft
Santesoft sante Pacs Server
Weaknesses CWE-787
CPEs cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*
Vendors & Products Santesoft
Santesoft sante Pacs Server

Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
Description During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
Title Santesoft Sante PACS Server Stack-based Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-03-14T13:41:49.600Z

Reserved: 2025-03-12T18:58:09.027Z

Link: CVE-2025-2263

cve-icon Vulnrichment

Updated: 2025-03-14T13:41:38.244Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-13T17:15:38.617

Modified: 2025-04-03T18:20:38.627

Link: CVE-2025-2263

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.