// For flags

CVE-2024-3120

Stack-Buffer Overflow in 'Content-Length' and 'Warning' Header Processing in sngrep

Severity Score

9.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.

Existe una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en todas las versiones de sngrep desde la v1.4.1. La falla se debe a una verificación inadecuada de los límites al copiar los encabezados 'Content-Length' y 'Warning' en búferes de tamaño fijo en las funciones sip_validate_packet y sip_parse_extra_headers dentro de src/sip.c. Esta vulnerabilidad permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (DoS) a través de mensajes SIP manipulados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-03-31 CVE Reserved
  • 2024-04-09 CVE Published
  • 2024-04-10 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
  • CAPEC-100: Overflow Buffers
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Irontec
Search vendor "Irontec"
Sngrep
Search vendor "Irontec" for product "Sngrep"
>= 1.4.1 <= 1.8.0
Search vendor "Irontec" for product "Sngrep" and version " >= 1.4.1 <= 1.8.0"
en
Affected