Логотип exploitDog
bind:CVE-2021-41794
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41794

Количество 3

Количество 3

nvd логотип

CVE-2021-41794

больше 4 лет назад

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-41794

больше 4 лет назад

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mv7p-ffm6-58w7

больше 3 лет назад

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41794

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-41794

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a ...

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-mv7p-ffm6-58w7

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу