Vulnerability Description
A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Orthanc-Server | Orthanc | < 1.12.11 |
Related Weaknesses (CWE)
References
- https://kb.cert.org/vuls/id/536588Third Party AdvisoryVDB Entry
- https://www.machinespirits.de/Not Applicable
- https://www.orthanc-server.com/Product
FAQ
What is CVE-2026-5439?
CVE-2026-5439 is a vulnerability with a CVSS score of 7.5 (HIGH). A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed siz...
How severe is CVE-2026-5439?
CVE-2026-5439 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5439?
Check the references section above for vendor advisories and patch information. Affected products include: Orthanc-Server Orthanc.