Description
A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check incorrectly succeeds, allowing the decoder to read and write to memory beyond allocated buffers.
Published: 2026-04-09
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via heap buffer overflow
Action: Immediate Patch
AI Analysis

Impact

During the decoding of PALETTE COLOR DICOM images, the Orthanc DICOM Server performs pixel length validation using 32‑bit multiplication for width and height. If the resulting product overflows, the check incorrectly succeeds, allowing the decoder to read and write beyond allocated buffers. This heap buffer overflow can corrupt memory and potentially enable arbitrary code execution or denial of service.

Affected Systems

The vulnerability affects the Orthanc DICOM Server. No specific product versions are listed in the available information; administrators should verify whether their deployment uses versions susceptible to the described issue.

Risk and Exploitability

Because the flaw is a classic heap buffer overflow, it presents a high risk of exploitation, especially if attackers can supply crafted DICOM files to the server. The CVSS score is not provided, and EPSS data is unavailable, but the nature of the vulnerability suggests that exploitation is feasible with minimal prerequisites. The vulnerability is not yet listed in the CISA KEV catalog, but that does not diminish its potential impact. Attacks would likely occur remotely via the network path that delivers DICOM images to the server.

Generated by OpenCVE AI on April 9, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Orthanc website or contact the vendor for a patch or update that addresses the buffer overflow.
  • Upgrade to the latest Orthanc release once a fix is available.
  • If a patch is not yet released, consider disabling PALETTE COLOR image decoding or rejecting such images from the server as a temporary safeguard.
  • Continue to monitor Orthanc vendor advisories and apply any security updates promptly.

Generated by OpenCVE AI on April 9, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-190

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc
Orthanc dicom Server
Vendors & Products Orthanc
Orthanc dicom Server

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check incorrectly succeeds, allowing the decoder to read and write to memory beyond allocated buffers.
Title Heap Buffer Overflow in DICOM Image Decoder (Palette Color Decode)
References

Subscriptions

Orthanc Dicom Server
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-09T14:43:15.227Z

Reserved: 2026-04-02T19:23:06.757Z

Link: CVE-2026-5443

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T15:16:16.653

Modified: 2026-04-09T15:16:16.653

Link: CVE-2026-5443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:39Z

Weaknesses