Description
A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Upgrade to sngrep version 1.8.1
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31722 | A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages. |
References
History
Fri, 21 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:irontec:sngrep:1.4.1:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Mon, 03 Feb 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Irontec
Irontec sngrep |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:irontec:sngrep:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Irontec
Irontec sngrep |
Status: PUBLISHED
Assigner: Pentraze
Published:
Updated: 2025-02-21T17:07:41.626Z
Reserved: 2024-03-31T17:10:14.906Z
Link: CVE-2024-3120
Updated: 2024-08-01T19:32:42.908Z
Status : Analyzed
Published: 2024-04-10T00:15:12.340
Modified: 2025-02-03T17:44:43.883
Link: CVE-2024-3120
No data.
OpenCVE Enrichment
No data.
EUVD