๐Ÿ” CVE Alert

CVE-2022-39063

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

When Open5GS UPF receives a PFCP Session Establishment Request, it stores related values for building the PFCP Session Establishment Response. Once UPF receives a request, it gets the f_teid_len from incoming message, and then uses it to copy data from incoming message to struct f_teid without checking the maximum length. If the pdi.local_f_teid.len exceeds the maximum length of the struct of f_teid, the memcpy() overwrites the fields (e.g., f_teid_len) after f_teid in the pdr struct. After parsing the request, the UPF starts to build a response. The f_teid_len with its overwritten value is used as a length for memcpy(). A segmentation fault occurs, as a result of a memcpy(), if this overwritten value is large enough.

CWE CWE-676
Vendor open5gs
Product open5gs
Published Sep 16, 2022
Last Updated Aug 3, 2024
Stay Ahead of the Next One

Get instant alerts for open5gs open5gs

Be the first to know when new unknown vulnerabilities affecting open5gs open5gs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Open5GS / Open5GS
<2.4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
synopsys.com: https://www.synopsys.com/blogs/software-security/cyrc-advisory-open5gs/