cve/2024/CVE-2024-24450.md

19 lines
890 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-24450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24450)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.
### POC
#### Reference
- https://cellularsecurity.org/ransacked
#### Github
- https://github.com/SpiralBL0CK/-CVE-2024-24450-
- https://github.com/plzheheplztrying/cve_monitor