A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc
Orthanc dicom Server |
|
| Vendors & Products |
Orthanc
Orthanc dicom Server |
Thu, 09 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction. | |
| Title | Memory Exhaustion via Forged ZIP Metadata | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-09T14:44:37.078Z
Reserved: 2026-04-02T19:22:13.583Z
Link: CVE-2026-5439
No data.
Status : Received
Published: 2026-04-09T15:16:15.443
Modified: 2026-04-09T15:16:15.443
Link: CVE-2026-5439
No data.