Description
A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.
Problem types
Timeline
| 2026-02-02: | Advisory disclosed |
| 2026-02-02: | VulDB entry created |
| 2026-02-12: | VulDB entry last update |
Credits
jungnickel (VulDB User)
References
github.com/open5gs/open5gs/issues/4177
vuldb.com/?id.343795 (VDB-343795 | Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow)
vuldb.com/?ctiid.343795 (VDB-343795 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.741901 (Submit #741901 | Open5GS v2.7.6 Buffer Over-read)
github.com/open5gs/open5gs/issues/4177
github.com/open5gs/open5gs/issues/4177
github.com/...ommit/54dda041211098730221d0ae20a2f9f9173e7a21
github.com/open5gs/open5gs/