Search CVE reports
11 – 20 of 48492 results
A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |
An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |
A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An...
1 affected package
orthanc
| Package | 16.04 LTS |
|---|---|
| orthanc | Needs evaluation |