A missing length check in `ogs_pfcp_subnet_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dnn` field with a value with length greater than 101.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/open5gs/open5gs/issues/3775 | exploit issue tracking |
https://gist.github.com/scemodicecosa/8643fbfc9490f40e955e9f9e9b0d9077 | broken link |
https://gist.github.com/scmdcs/8643fbfc9490f40e955e9f9e9b0d9077 | third party advisory exploit |