CVE-2026-5444

NameCVE-2026-5444
DescriptionA heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen values can cause an integer overflow during buffer size calculation, resulting in the allocation of a small buffer followed by a much larger write operation during pixel processing.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
orthanc (PTS)bullseye1.9.2+really1.9.1+dfsg-1+deb11u1vulnerable
bullseye (security)1.9.2+really1.9.1+dfsg-1+deb11u2vulnerable
bookworm, bookworm (security)1.10.1+dfsg-2+deb12u1vulnerable
trixie1.12.7+dfsg-4vulnerable
forky, sid1.12.10+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
orthancsource(unstable)(unfixed)

Notes

https://kb.cert.org/vuls/id/536588

Search for package or bug name: Reporting problems