Vulnerability Details CVE-2024-3120
A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.7%
CVSS Severity
CVSS v3 Score 9.0
Products affected by CVE-2024-3120
-
cpe:2.3:a:irontec:sngrep:1.4.1
-
cpe:2.3:a:irontec:sngrep:1.4.10
-
cpe:2.3:a:irontec:sngrep:1.4.2
-
cpe:2.3:a:irontec:sngrep:1.4.3
-
cpe:2.3:a:irontec:sngrep:1.4.4
-
cpe:2.3:a:irontec:sngrep:1.4.5
-
cpe:2.3:a:irontec:sngrep:1.4.6
-
cpe:2.3:a:irontec:sngrep:1.4.7
-
cpe:2.3:a:irontec:sngrep:1.4.8
-
cpe:2.3:a:irontec:sngrep:1.4.9
-
cpe:2.3:a:irontec:sngrep:1.5.0
-
cpe:2.3:a:irontec:sngrep:1.6.0
-
cpe:2.3:a:irontec:sngrep:1.7.0