Lucene search

K
osvGoogleOSV:CVE-2021-41794
HistoryOct 07, 2021 - 3:15 p.m.

CVE-2021-41794

2021-10-0715:15:11
Google
osv.dev
7

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.3%

ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with “internet” as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, ‘i’ gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.3%

Related for OSV:CVE-2021-41794