A missing length check in `ogs_pfcp_subnet_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dnn` field with a value with length greater than 101.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/open5gs/open5gs/issues/3775 | issue tracking exploit |
https://gist.github.com/scemodicecosa/8643fbfc9490f40e955e9f9e9b0d9077 | broken link |
https://gist.github.com/scmdcs/8643fbfc9490f40e955e9f9e9b0d9077 | exploit third party advisory |