CVE-2021-41794
07.10.2021, 15:15
ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.
| Vendor | Product | Version |
|---|---|---|
| open5gs | open5gs | 1.0.0 ≤ 𝑥 ≤ 2.3.3 |
𝑥
= Vulnerable software versions
References