Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 15 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc-server
Orthanc-server orthanc |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Orthanc-server
Orthanc-server orthanc |
Wed, 15 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 |
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc
Orthanc dicom Server |
|
| Vendors & Products |
Orthanc
Orthanc dicom Server |
Thu, 09 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory. | |
| Title | Gzip Decompression Bomb via Content-Encoding Header | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-14T16:34:26.623Z
Reserved: 2026-04-02T19:21:58.543Z
Link: CVE-2026-5438
Updated: 2026-04-14T15:13:15.906Z
Status : Analyzed
Published: 2026-04-09T15:16:15.327
Modified: 2026-04-15T19:31:48.380
Link: CVE-2026-5438
No data.
OpenCVE Enrichment
Updated: 2026-04-15T22:45:16Z