5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package open5gs-webui
Open5GS SGWC context.c sgwc_tunnel_add assertion
A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
References
- VDB-343637 | Open5GS SGWC context.c sgwc_tunnel_add assertion vdb-entry technical-description
- VDB-343637 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #741193 | Open5gs SGWC v2.7.6 Denial of Service third-party-advisory
- https://github.com/open5gs/open5gs/issues/4261 issue-tracking
- https://github.com/open5gs/open5gs/issues/4261#event-21968563677 issue-tracking
- https://github.com/open5gs/open5gs/issues/4261#issue-3787803578 issue-tracking exploit
- https://github.com/open5gs/open5gs/ product
Affected products
- ==2.7.3
- ==2.7.5
- ==2.7.0
- ==2.7.4
- ==2.7.1
- ==2.7.6
- ==2.7.2
Package maintainers
-
@Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com>