Impact
A heap buffer overflow exists in Orthanc when it parses a PAM image embedded in a DICOM file; the software multiplies image dimensions with 32‑bit unsigned arithmetic, and deliberately chosen values cause an integer overflow that results in a small buffer being allocated while pixel processing writes beyond its bounds, corrupting memory and potentially allowing an attacker to execute arbitrary code if the server processes untrusted files.
Affected Systems
Orthanc, the open-source DICOM Server, is affected; all installations that accept DICOM files containing PAM images are at risk and, because no version limits are provided, every current release should be considered vulnerable until a vendor fix is released.
Risk and Exploitability
The CVSS score is not supplied, but the absence of a patch and the ability for an attacker to trigger the flaw remotely by crafting a DICOM file suggest high exploitability; EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, yet the attack vector is remote over the network where malicious DICOM uploads are processed, posing a significant threat to exposed servers.
OpenCVE Enrichment