Untriaged
Permalink
CVE-2025-15555
7.3 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow
A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.
References
-
VDB-343795 | Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow vdb-entrytechnical-description
-
-
Submit #741901 | Open5GS v2.7.6 Buffer Over-read third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4177 issue-tracking
-
VDB-343795 | Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow vdb-entrytechnical-description
-
-
Submit #741901 | Open5GS v2.7.6 Buffer Over-read third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4177 issue-tracking
Affected products
Open5GS
- ==2.7.1
- ==2.7.5
- ==2.7.3
- ==2.7.6
- ==2.7.4
- ==2.7.2
- ==2.7.0
Package maintainers
-
@Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com>
-
@xddxdd Yuhui Xu <b980120@hotmail.com>