CVE-2023-47345

Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero.
References
Link Resource
https://github.com/free5gc/free5gc/issues/483 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*

History

21 Nov 2023, 01:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*
References () https://github.com/free5gc/free5gc/issues/483 - () https://github.com/free5gc/free5gc/issues/483 - Exploit, Issue Tracking
First Time Free5gc
Free5gc free5gc
CWE CWE-120

15 Nov 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-15 22:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-47345

Mitre link : CVE-2023-47345

CVE.ORG link : CVE-2023-47345


JSON object : View

Products Affected

free5gc

  • free5gc
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')