Description
An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate escape markers placed near the end of the compressed data stream. A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output.
Published: 2026-04-09
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Data Leakage via Out-of-Bounds Read
Action: Patch
AI Analysis

Impact

An out-of-bounds read occurs in the DecodePsmctRle1 function used by Orthanc to decompress Philips PMSCT_RLE1 DICOM files. The decompression routine fails to validate escape markers near the end of the compressed stream. When a maliciously crafted sequence is placed at the end of the buffer, the decoder reads beyond the allocated memory, leaking heap data into the rendered image output. The result is an unintended disclosure of sensitive memory contents, potentially exposing confidential information to an attacker. This vulnerability does not provide direct execution of code but allows information compromise.

Affected Systems

The flaw resides in the Orthanc DICOM Server. Any deployment that includes the affected DicomImageDecoder implementation and processes PMSCT_RLE1 compressed data is potentially exposed. Vendor supplied version information is not provided, so all current releases that have not been patched may be at risk until an update is released.

Risk and Exploitability

No EPSS score and the issue is not listed in the KEV catalog, indicating no public exploit at this time. The CVSS rating is not given, but the lack of RCE and requirement of a crafted DICOM file suggest a medium severity. An attacker would need to supply a malicious DICOM file using the Philips compression format; the server would be required to parse it, after which memory contents could leak. The potential impact is limited to confidentiality leakage rather than denial of service or privilege escalation. The overall risk is moderate for environments that accept untrusted DICOM files, especially those handling sensitive patient data.

Generated by OpenCVE AI on April 9, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Orthanc update that fixes the DecodePsmctRle1 out-of-bounds read
  • If the patch is unavailable, block or quarantine incoming DICOM files that use PMSCT_RLE1 compression
  • Restrict access to the Orthanc server to trusted networks and enforce strong authentication
  • Monitor logs for abnormal decoding failures or repeated out-of-bounds attempts
  • Consider disabling support for Philips proprietary compression if not required for operations
  • Perform regular security assessments and vulnerability scans to detect any further exploitation attempts

Generated by OpenCVE AI on April 9, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-20

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc
Orthanc dicom Server
Vendors & Products Orthanc
Orthanc dicom Server

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate escape markers placed near the end of the compressed data stream. A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output.
Title Out-of-Bounds Read in DicomImageDecoder (PMSCT_RLE1 Decompression)
References

Subscriptions

Orthanc Dicom Server
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-09T14:42:04.597Z

Reserved: 2026-04-02T19:22:35.863Z

Link: CVE-2026-5441

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T15:16:16.443

Modified: 2026-04-09T15:16:16.443

Link: CVE-2026-5441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:42Z

Weaknesses