Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
History

Fri, 28 Mar 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SNPS

Published: 2023-02-01T00:00:00.000Z

Updated: 2025-03-27T13:23:37.577Z

Reserved: 2023-01-18T00:00:00.000Z

Link: CVE-2023-23846

cve-icon Vulnrichment

Updated: 2024-08-02T10:42:26.670Z

cve-icon NVD

Status : Modified

Published: 2023-02-01T03:15:08.593

Modified: 2025-03-27T14:15:20.553

Link: CVE-2023-23846

cve-icon Redhat

No data.