Home

Description

Sante PACS Server HTTP Content-Length Header Handling NULL Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP Content-Length header. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-26770.

PUBLISHED Reserved 2025-12-10 | Published 2025-12-23 | Updated 2025-12-29 | Assigner zdi




HIGH: 7.5CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-476: NULL Pointer Dereference

Product status

Default status
unknown

4.2.2
affected

References

www.zerodayinitiative.com/advisories/ZDI-25-1104/ (ZDI-25-1104)

cve.org (CVE-2025-14501)

nvd.nist.gov (CVE-2025-14501)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.