Untriaged
Permalink
CVE-2026-2517
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Open5GS SMF types.c ogs_gtp2_parse_tft denial of service
A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
-
VDB-346108 | Open5GS SMF types.c ogs_gtp2_parse_tft denial of service vdb-entrytechnical-description
-
-
Submit #738332 | Open5GS SMF v2.7.6 Denial of Service third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4281 issue-tracking
-
-
VDB-346108 | Open5GS SMF types.c ogs_gtp2_parse_tft denial of service vdb-entrytechnical-description
-
-
Submit #738332 | Open5GS SMF v2.7.6 Denial of Service third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4281 issue-tracking
-
Affected products
Open5GS
- ==2.7.4
- ==2.7.6
- ==2.7.1
- ==2.7.3
- ==2.7.2
- ==2.7.5
- ==2.7.0
Matching in nixpkgs
pkgs.open5gs
4G/5G core network components
Package maintainers
-
@Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com>
-
@xddxdd Yuhui Xu <b980120@hotmail.com>