Description
A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.
Published: 2026-04-09
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Memory Exhaustion
Action: Apply Patch
AI Analysis

Impact

Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts the uncompressed size metadata for each file. An attacker can craft a small ZIP file with a forged size value that is many times larger than the actual compressed data. When the server processes the file, it allocates memory buffers based on the forged size, rapidly consuming system memory. This results in the Orthanc process becoming unresponsive or crashing, effectively denying service to legitimate users.

Affected Systems

The flaw exists in all versions of the Orthanc DICOM server that include the automatic ZIP extraction feature. The advisory does not list specific version numbers, which suggests that every release supporting this behavior is vulnerable unless the feature has been disabled via configuration. Hospital imaging infrastructures and any environment that relies on Orthanc for quick uploads must verify whether automatic extraction is active and whether a fix has been applied.

Risk and Exploitability

The vulnerability can be triggered by delivering a crafted ZIP file over the network to an Orthanc endpoint, which is likely exposed to remote users. No publicly demonstrated exploit is known and the EPSS score is not available. However, the potential to consume all available memory and bring down a critical medical imaging server makes the risk significant. The situation is especially serious in high‑availability or critical‑care environments where uninterrupted service is essential.

Generated by OpenCVE AI on April 9, 2026 at 17:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If a vendor patch is available, apply the latest update immediately.
  • If no patch is released, temporarily disable the automatic ZIP extraction feature or block ZIP uploads entirely.
  • Consider implementing additional checks to validate ZIP metadata before extraction, ensuring uncompressed size limits are enforced.

Generated by OpenCVE AI on April 9, 2026 at 17:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc
Orthanc dicom Server
Vendors & Products Orthanc
Orthanc dicom Server

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.
Title Memory Exhaustion via Forged ZIP Metadata
References

Subscriptions

Orthanc Dicom Server
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-09T14:44:37.078Z

Reserved: 2026-04-02T19:22:13.583Z

Link: CVE-2026-5439

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T15:16:15.443

Modified: 2026-04-09T15:16:15.443

Link: CVE-2026-5439

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:34Z

Weaknesses

No weakness.