Home

Description

During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.

PUBLISHED Reserved 2025-03-12 | Published 2025-03-13 | Updated 2025-03-14 | Assigner tenable




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

Default status
unaffected

4.1.0
affected

4.2.0
unaffected

References

www.tenable.com/security/research/tra-2025-08 exploit

www.tenable.com/security/research/tra-2025-08

cve.org (CVE-2025-2263)

nvd.nist.gov (CVE-2025-2263)

Download JSON