Description
A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Exhaustion
Action: Immediate Patch
AI Analysis

Impact

Orthanc DICOM Server can be tricked into allocating excessive memory when it processes an HTTP request that includes a 'Content-Encoding: gzip' header bearing a specially crafted, over‑compressed payload. The server trusts the gzip compression metadata to size the buffer, so the attacker can trigger an allocation that far exceeds the real payload size. This unchecked allocation flaw is a manifestation of CWE‑770 and can lead to memory exhaustion, potentially causing the service to become unresponsive or crash, thereby denying legitimate users access.

Affected Systems

Orthanc DICOM Server. No specific product versions are listed in the available data.

Risk and Exploitability

The configuration results in a CVSS score of 7.5, indicating a high‑severity vulnerability. The EPSS score is below 1 %, and the issue is not currently in CISA’s KEV catalog, suggesting that large‑scale or automated exploitation is unlikely at present. However, the attack path is straightforward: any external user can send an HTTP request with the Content‑Encoding header and an adversarial gzip body; no authentication or privileged context is required. Because the server does not check decompressed size, the exploit is reliable and can be launched remotely. System administrators should treat this with high urgency, following vendor guidance for a definitive fix when it becomes available.

Generated by OpenCVE AI on April 15, 2026 at 22:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Orthanc vendor website for a patch or newer release that limits decompressed size.
  • If no patch is available, configure the Orthanc service or a reverse proxy to reject HTTP requests that specify Content‑Encoding: gzip.
  • Implement network‑level controls to limit memory usage or memory allocation on the host, such as cgroups or similar.
  • Monitor server memory usage and application logs for abnormal spikes to detect attempted exploitation.

Generated by OpenCVE AI on April 15, 2026 at 22:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc-server
Orthanc-server orthanc
Weaknesses CWE-770
CPEs cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:*
Vendors & Products Orthanc-server
Orthanc-server orthanc

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc
Orthanc dicom Server
Vendors & Products Orthanc
Orthanc dicom Server

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.
Title Gzip Decompression Bomb via Content-Encoding Header
References

Subscriptions

Orthanc Dicom Server
Orthanc-server Orthanc
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-14T16:34:26.623Z

Reserved: 2026-04-02T19:21:58.543Z

Link: CVE-2026-5438

cve-icon Vulnrichment

Updated: 2026-04-14T15:13:15.906Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T15:16:15.327

Modified: 2026-04-15T19:31:48.380

Link: CVE-2026-5438

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:45:16Z

Weaknesses