A vulnerability was found in Open5GS up to 2.7.5. It has been classified as problematic. Affected is the function amf_nsmf_pdusession_handle_release_sm_context of the file src/amf/nsmf-handler.c of the component AMF Service. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The name of the patch is 66bc558e417e70ae216ec155e4e81c14ae0ecf30. It is recommended to apply a patch to fix this issue.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://vuldb.com/?id.319128 | vdb entry technical description |
https://vuldb.com/?ctiid.319128 | signature permissions required |
https://vuldb.com/?submit.621282 | third party advisory |
https://github.com/open5gs/open5gs/issues/4012 | issue tracking |
https://github.com/user-attachments/files/21356631/amf_nsmf_pdusession_handle_release_sm_context.zip | exploit |
https://github.com/open5gs/open5gs/commit/66bc558e417e70ae216ec155e4e81c14ae0ecf30 | patch |