ogs_fqdn_parse in Open5GS 1.0.0... CVE-2021-41794

5.0 AV AC AU C I A
发布: 2021-10-07
修订: 2024-11-21

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

0%
暂无可用Exp或PoC
当前有1条受影响产品信息