A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Feb 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Irontec
Irontec sngrep |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:irontec:sngrep:*:*:*:*:*:*:*:* | |
Vendors & Products |
Irontec
Irontec sngrep |

Status: PUBLISHED
Assigner: Pentraze
Published: 2024-04-09T23:55:43.501Z
Updated: 2024-08-08T21:20:41.031Z
Reserved: 2024-03-31T17:10:09.267Z
Link: CVE-2024-3119

Updated: 2024-08-01T19:32:42.915Z

Status : Analyzed
Published: 2024-04-10T00:15:12.107
Modified: 2025-02-03T17:43:02.523
Link: CVE-2024-3119

No data.