3 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

O-RAN Software Community ric-plt-lib-rmr v4.9.0 does not validate the source of the routing tables it receives, potentially allowing attackers to send forged routing tables to the device. O-RAN Software Community ric-plt-lib-rmr v4.9.0 no valida la fuente de las tablas de enrutamiento que recibe, permitiendo potencialmente a los atacantes enviar tablas de enrutamiento falsificadas al dispositivo. • https://jira.o-ran-sc.org/browse/RIC-1001 https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet. • https://jira.o-ran-sc.org/browse/RIC-991 https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via the packet size component. • https://jira.o-ran-sc.org/browse/RIC-989 https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •