Invalid pointer release vulnerability. Exploitation of this vulnerability could allow an attacker to interrupt the correct operation of the service by sending a specially crafted json string to the VNF (Virtual Network Function), and triggering the ogs_sbi_message_free function, which could cause a service outage.
Published 2023-10-03 15:15:41
Updated 2023-10-05 00:58:08
View at NVD,   CVE.org

Products affected by CVE-2023-4883

Exploit prediction scoring system (EPSS) score for CVE-2023-4883

0.07%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-4883

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.9
3.6
Spanish National Cybersecurity Institute, S.A. (INCIBE)
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.9
3.6
NIST

CWE ids for CVE-2023-4883

  • The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.
    Assigned by:
    • cve-coordination@incibe.es (Secondary)
    • nvd@nist.gov (Primary)

References for CVE-2023-4883

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!