A stack overflow in the sctp_server::sctp_receiver_thread component of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) by repeatedly establishing SCTP connections with the N2 interface.
History

Fri, 24 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Description A stack overflow in the sctp_server::sctp_receiver_thread component of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) by repeatedly establishing SCTP connections with the N2 interface.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-01-21T00:00:00.000Z

Updated: 2025-01-24T19:12:55.078Z

Reserved: 2024-01-25T00:00:00.000Z

Link: CVE-2024-24451

cve-icon Vulnrichment

Updated: 2025-01-24T19:12:49.472Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-21T22:15:12.013

Modified: 2025-01-24T20:15:32.263

Link: CVE-2024-24451

cve-icon Redhat

No data.