Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sipp Project
Sipp Project sipp |
|
| CPEs | cpe:2.3:a:sipp_project:sipp:3.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Sipp Project
Sipp Project sipp |
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sipp
Sipp sipp |
|
| Vendors & Products |
Sipp
Sipp sipp |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets. | |
| Title | SIPP 3.3 Stack-Based Buffer Overflow via Configuration File | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T14:07:37.759Z
Reserved: 2026-03-28T11:50:18.468Z
Link: CVE-2018-25225
Updated: 2026-03-30T14:07:27.327Z
Status : Analyzed
Published: 2026-03-28T12:16:03.560
Modified: 2026-04-08T19:36:28.587
Link: CVE-2018-25225
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:29:30Z