TL;DR

Sante DICOM Viewer Pro suffers from a buffer overflow that permits remote code execution with user interaction. CVSS rating: 7.8

What happened

['Buffer overflow in DCM file parsing allows for RCE']

Why it matters for ops

['User must interact with malicious content to trigger vulnerability', 'Exploitation requires visiting compromised or attacker-controlled sites, opening of malicious files']

Mitigation

  • Update to the latest version with patches
  • Disable unnecessary features or protocols that may expose vulnerable components

Action items

  • Apply available security updates
  • Conduct a risk assessment for DICOM Viewer Pro usage

Detection IOCs

  • Unexpected crashes when handling DCM files
  • Increased network traffic related to file transfers

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-104/