Description
A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.
Published: 2024-04-09
Score: 9 Critical
EPSS: 3.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Upgrade to sngrep version 1.8.1

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-31722 A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.
History

Fri, 21 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:irontec:sngrep:1.4.1:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 03 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Irontec
Irontec sngrep
Weaknesses CWE-787
CPEs cpe:2.3:a:irontec:sngrep:*:*:*:*:*:*:*:*
Vendors & Products Irontec
Irontec sngrep

cve-icon MITRE

Status: PUBLISHED

Assigner: Pentraze

Published:

Updated: 2025-02-21T17:07:41.626Z

Reserved: 2024-03-31T17:10:14.906Z

Link: CVE-2024-3120

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:42.908Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T00:15:12.340

Modified: 2025-02-03T17:44:43.883

Link: CVE-2024-3120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses