First published: Thu Nov 16 2023(Updated: )
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero.
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/free5gc/free5gc | <=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this buffer overflow vulnerability is GHSA-6944-6pmv-6mp2.
The severity of GHSA-6944-6pmv-6mp2 is not mentioned in the available information.
The buffer overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service by sending a crafted PFCP message with a malformed PFCP Heartbeat message.
The available information does not mention specific mitigation steps for this vulnerability.
You can find more information about this buffer overflow vulnerability at the following references: CVE-2023-47345, GitHub issue #483, and GitHub Advisory GHSA-6944-6pmv-6mp2.