Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62mp-w633-xcfv

Опубликовано: 15 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.

Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.

EPSS

Процентиль: 93%
0.09365
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 5.3
nvd
около 1 года назад

Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.

EPSS

Процентиль: 93%
0.09365
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-120