CVE-2023-41627
https://notcve.org/view.php?id=CVE-2023-41627
O-RAN Software Community ric-plt-lib-rmr v4.9.0 does not validate the source of the routing tables it receives, potentially allowing attackers to send forged routing tables to the device. O-RAN Software Community ric-plt-lib-rmr v4.9.0 no valida la fuente de las tablas de enrutamiento que recibe, permitiendo potencialmente a los atacantes enviar tablas de enrutamiento falsificadas al dispositivo. • https://jira.o-ran-sc.org/browse/RIC-1001 https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html •
CVE-2023-40997
https://notcve.org/view.php?id=CVE-2023-40997
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet. • https://jira.o-ran-sc.org/browse/RIC-991 https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-40998
https://notcve.org/view.php?id=CVE-2023-40998
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via the packet size component. • https://jira.o-ran-sc.org/browse/RIC-989 https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •