A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large dimensions to be processed. This causes an integer overflow during frame size calculation and results in out-of-bounds memory access during image decoding.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 CWE-680 |
Tue, 14 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc-server
Orthanc-server orthanc |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Orthanc-server
Orthanc-server orthanc |
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 CWE-680 |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc
Orthanc dicom Server |
|
| Vendors & Products |
Orthanc
Orthanc dicom Server |
Thu, 09 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large dimensions to be processed. This causes an integer overflow during frame size calculation and results in out-of-bounds memory access during image decoding. | |
| Title | Heap Buffer Overflow in DICOM Image Decoder via VR UL Dimensions | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2026-04-09T14:43:43.571Z
Updated: 2026-04-14T16:34:39.322Z
Reserved: 2026-04-02T19:22:48.196Z
Link: CVE-2026-5442
Updated: 2026-04-14T15:12:01.918Z
Status : Analyzed
Published: 2026-04-09T15:16:16.543
Modified: 2026-04-14T20:19:46.320
Link: CVE-2026-5442
No data.