Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-5438

Опубликовано: 09 апр. 2026
Источник: debian
EPSS Низкий

Описание

A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
orthancfixed1.12.10+dfsg-4package

Примечания

  • https://kb.cert.org/vuls/id/536588

  • https://orthanc.uclouvain.be/hg/orthanc/rev/5ce108190752

EPSS

Процентиль: 4%
0.00017
Низкий

Связанные уязвимости

ubuntu
5 дней назад

A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.

nvd
5 дней назад

A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.

github
5 дней назад

A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory.

EPSS

Процентиль: 4%
0.00017
Низкий