01 Fév 2023
Vulnérabilité CVE-2023-23846 CVE Vulnerability
Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C (CVSS:0.0) (Last Update:2023-02-01)
Vulnerability Details : Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C Publish Date : 2023-02-01 Last Update Date : 2023-02-01 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2023-23846
- References For CVE-2023-23846
| ||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2023-23846There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |