2025-01-28 23:03:47 +00:00

60 lines
2.1 KiB
JSON

{
"id": "CVE-2023-37008",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.373",
"lastModified": "2025-01-28T22:15:15.390",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain a buffer overflow in the ASN.1 deserialization function of the S1AP handler. This buffer overflow causes type confusion in decoded fields, leading to invalid parsing and freeing of memory. An attacker may use this to crash an MME or potentially execute code in certain circumstances."
},
{
"lang": "es",
"value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen un desbordamiento de b\u00fafer en la funci\u00f3n de deserializaci\u00f3n ASN.1 del controlador S1AP. Este desbordamiento de b\u00fafer provoca confusi\u00f3n de tipos en los campos decodificados, lo que genera un an\u00e1lisis no v\u00e1lido y la liberaci\u00f3n de memoria. Un atacante puede utilizar esto para bloquear un MME o potencialmente ejecutar c\u00f3digo en determinadas circunstancias."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
}
]
}