The vulnerability is a denial of service in the free5GC AUSF component, caused by a nil pointer dereference. The analysis of the provided information, including the vulnerability description and the patch, identified two key functions involved in the vulnerability.
-
UeAuthPostRequestProcedure in internal/sbi/processor/ue_authentication.go: This function is the entry point for handling UE authentication requests. The patch 3b9ac4403c2756dc89a5ed3cdcefe688458588aa modifies this function to add checks before calling GetSupiFromSuciSupiMap. This indicates that UeAuthPostRequestProcedure was the function that was processing the malicious input and would be present in any runtime profile during exploitation.
-
GetSupiFromSuciSupiMap in internal/context/context.go: The vulnerability description explicitly names this function as the place where the panic occurs due to an improper nil check before an interface conversion. Although the patch is not in this function, it is the root cause of the crash. The patch in UeAuthPostRequestProcedure is a mitigation to prevent this function from being called with invalid data.
Therefore, both functions are critical to understanding and identifying this vulnerability. UeAuthPostRequestProcedure is the function that receives the malicious input, and GetSupiFromSuciSupiMap is the function that contains the vulnerable code that causes the service to crash.