Description
A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Upgrade to sngrep version 1.8.1
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31721 | A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages. |
References
History
Mon, 03 Feb 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Irontec
Irontec sngrep |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:irontec:sngrep:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Irontec
Irontec sngrep |
Status: PUBLISHED
Assigner: Pentraze
Published:
Updated: 2024-08-08T21:20:41.031Z
Reserved: 2024-03-31T17:10:09.267Z
Link: CVE-2024-3119
Updated: 2024-08-01T19:32:42.915Z
Status : Analyzed
Published: 2024-04-10T00:15:12.107
Modified: 2025-02-03T17:43:02.523
Link: CVE-2024-3119
No data.
OpenCVE Enrichment
No data.
EUVD